Communication technologies have revolutionized modern society. They have changed the way we do business, travel, manage our personal lives and communicate with our friends. In many cases, this crucially depends on accurate and reliable authentication. We need to get authenticated in order to get access to restricted services and/or places (i.e. transport systems, e-banking, border control). This authentication is performed in constrained settings due to: (i) privacy issues, (ii) noisy conditions, (iii) resource constraints. Privacy-preservation is essential for the protection of sensitive information (i.e. diseases, location, nationality). Noisy conditions refer to physical noise in the communication channel that may lead to modification of...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
In this paper we analyze two types of biometric identification systems with protected templates that...
Authentication has become a critical step to gain access to services such as on-line banking, e-comm...
The design of a secure authentication scheme for Radio Frequency Identification (RFID) systems has b...
Authentication protocols are usually designed to face an adversary who is able to tamper with the ch...
International audienceThe Internet has consolidated itself as a very powerful platform that has chan...
In this chapter we discuss authentication techniques involving data such as biometrics, which are as...
Authentication and Privacy are important concerns in current low power wireless devices like RFID an...
This work presents my research results of six months spent at the Université catholique de Louvain i...
This thesis describes the implementation of a verifier, revocation authority and issuer side of an a...
Several recent studies have demonstrated that people show large behavioural uniqueness. This has ser...
Abstract. Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive co...
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events...
Wireless sensor networks consist of a large number of distributed sensor nodes so that potential ris...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
In this paper we analyze two types of biometric identification systems with protected templates that...
Authentication has become a critical step to gain access to services such as on-line banking, e-comm...
The design of a secure authentication scheme for Radio Frequency Identification (RFID) systems has b...
Authentication protocols are usually designed to face an adversary who is able to tamper with the ch...
International audienceThe Internet has consolidated itself as a very powerful platform that has chan...
In this chapter we discuss authentication techniques involving data such as biometrics, which are as...
Authentication and Privacy are important concerns in current low power wireless devices like RFID an...
This work presents my research results of six months spent at the Université catholique de Louvain i...
This thesis describes the implementation of a verifier, revocation authority and issuer side of an a...
Several recent studies have demonstrated that people show large behavioural uniqueness. This has ser...
Abstract. Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive co...
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events...
Wireless sensor networks consist of a large number of distributed sensor nodes so that potential ris...
An emerging direction for authenticating people is the adoption of biometric authentication systems....
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
In this paper we analyze two types of biometric identification systems with protected templates that...