Results 31 to 40 of about 6,416 (199)
Authentification, identification et tiers de confiance [PDF]
Cet article explore les methodes et moyens a mettre en œuvre pour reconstruire la separation entre espaces public et prive, mise a mal par la connexion continue sur les reseaux. Il est difficile et pourtant indispensable de proposer un nouveau paradigme garantissant l’exercice de la liberte individuelle car celle-ci n’est plus assuree selon le cadre ...
openaire +4 more sources
Improving the capacity of the ping-pong protocol
We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol.
A. Beige +4 more
core +1 more source
Discurso autobiográfico y proceso de autentificación en Cárcel de amor de Diego de San Pedro
El importante papel desempeñado por el narrador-autor de Cárcel de Amor nos lleva a reconsiderar el texto como la escritura autobiográfica, gracias a su intervención en el plano narrativo como mediador en el proceso de amor.
Jorge Chen Sham
doaj +1 more source
Multiparty Quantum Secret Sharing
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons.
B. Schneier +4 more
core +1 more source
LE DIGIPASS UNE TECHNOLOGIE BREVETÉE PAR VASCO [PDF]
VASCO Data Security lancement du Digipass un lecteur de cartes ŕ puce offrant des fonctions d’authentification multiples en combinant la fonction “ce que vous voyez est ce que vous signez”.
Titrade Cristina, El Baaboua Florentina
doaj
Sarraounia, une reine africaine entre histoire et mythe littéraire (Niger, 1899-2010)
The writer Abdoulaye Mamani, using oral myths from the area of Lougou, Niger, re-wrote the story of Queen Sarraounia, who was said to have fought the French Voulet-Chanoine column in 1899. Published in 1980, he intended his novel Sarraounia to be a form
Elara Bertho
doaj +1 more source
Paleomicrobiology Data: Authentification and Interpretation
ABSTRACT The authenticity of some of the very first works in the field of paleopathology has been questioned, and standards have been progressively established for the experiments and the interpretation of data. Whereas most problems initially arose from the contamination of ancient specimens with modern human DNA, the situation is different ...
openaire +2 more sources
A survey on blockchain deployment for biometric systems
The purpose of this work is to investigate blockchain‐based biometric applications to benefit the government, people, and businesses boosting the level of privacy and security. Blockchain properties can enhance conventional biometric systems for the storage and protection of biometric templates, identity management, and biometric authentication systems.
Surbhi Sharma, Rudresh Dwivedi
wiley +1 more source
Trust in the digital world - the return of the kings of old [PDF]
Drawing principally on examples and literature from the Anglosphere, the author argues that the high salience given to "trust" and "trustworthiness" in recent scholarly literature, and which (notably in Putnam's work) attributes declining trust to a ...
Collins, Richard
core
BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs
-Wireless body area network(WBAN) has shown great potential in improving healthcare quality not only for patients but also for medical staff. However, security and privacy are still an important issue in WBANs especially in multi-hop architectures.
Chaudet, Claude +2 more
core +3 more sources

