Results 31 to 40 of about 6,416 (199)

Authentification, identification et tiers de confiance [PDF]

open access: yesHermès, 2009
Cet article explore les methodes et moyens a mettre en œuvre pour reconstruire la separation entre espaces public et prive, mise a mal par la connexion continue sur les reseaux. Il est difficile et pourtant indispensable de proposer un nouveau paradigme garantissant l’exercice de la liberte individuelle car celle-ci n’est plus assuree selon le cadre ...
openaire   +4 more sources

Improving the capacity of the ping-pong protocol

open access: yes, 2003
We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol.
A. Beige   +4 more
core   +1 more source

Discurso autobiográfico y proceso de autentificación en Cárcel de amor de Diego de San Pedro

open access: yesRevista de Filología y Lingüística de la Universidad de Costa Rica, 2015
El importante papel desempeñado por el narrador-autor de Cárcel de Amor nos lleva a reconsiderar el texto como la escritura autobiográfica, gracias a su intervención en el plano narrativo como mediador en el proceso de amor.
Jorge Chen Sham
doaj   +1 more source

Multiparty Quantum Secret Sharing

open access: yes, 2004
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
B. Schneier   +4 more
core   +1 more source

LE DIGIPASS UNE TECHNOLOGIE BREVETÉE PAR VASCO [PDF]

open access: yesAnnals of the University of Oradea: Economic Science, 2009
VASCO Data Security lancement du Digipass un lecteur de cartes ŕ puce offrant des fonctions d’authentification multiples en combinant la fonction “ce que vous voyez est ce que vous signez”.
Titrade Cristina, El Baaboua Florentina
doaj  

Sarraounia, une reine africaine entre histoire et mythe littéraire (Niger, 1899-2010)

open access: yesGenre & Histoire, 2011
The writer Abdoulaye Mamani, using oral myths from the area of Lougou, Niger, re-wrote the story of Queen Sarraounia, who was said to have fought the French Voulet-Chanoine column in 1899. Published in 1980, he intended his novel Sarraounia  to be a form
Elara Bertho
doaj   +1 more source

Paleomicrobiology Data: Authentification and Interpretation

open access: yesMicrobiology Spectrum, 2016
ABSTRACT The authenticity of some of the very first works in the field of paleopathology has been questioned, and standards have been progressively established for the experiments and the interpretation of data. Whereas most problems initially arose from the contamination of ancient specimens with modern human DNA, the situation is different ...
openaire   +2 more sources

A survey on blockchain deployment for biometric systems

open access: yesIET Blockchain, Volume 4, Issue 2, Page 124-151, June 2024.
The purpose of this work is to investigate blockchain‐based biometric applications to benefit the government, people, and businesses boosting the level of privacy and security. Blockchain properties can enhance conventional biometric systems for the storage and protection of biometric templates, identity management, and biometric authentication systems.
Surbhi Sharma, Rudresh Dwivedi
wiley   +1 more source

Trust in the digital world - the return of the kings of old [PDF]

open access: yes, 2008
Drawing principally on examples and literature from the Anglosphere, the author argues that the high salience given to "trust" and "trustworthiness" in recent scholarly literature, and which (notably in Putnam's work) attributes declining trust to a ...
Collins, Richard
core  

BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs

open access: yes, 2016
-Wireless body area network(WBAN) has shown great potential in improving healthcare quality not only for patients but also for medical staff. However, security and privacy are still an important issue in WBANs especially in multi-hop architectures.
Chaudet, Claude   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy