Sciweavers

221 search results - page 17 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
CIA
2003
Springer
14 years 1 months ago
Trust Networks on the Semantic Web
The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, ce...
Jennifer Golbeck, Bijan Parsia, James A. Hendler
DIM
2005
ACM
13 years 10 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
CHI
2003
ACM
14 years 8 months ago
Amigo - wireless image based instant messaging for handheld computers
We introduce Amigo ? an Instant Messaging (IM) client for handheld computers. Amigo allows free-form images as well as handwriting to be sent between people, taking advantage of t...
Elisabeth Windt, Helena Fabersjö, Johan Sanne...
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 3 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
TIFS
2010
140views more  TIFS 2010»
13 years 3 months ago
An Evaluation of Video-to-Video Face Verification
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedd...
Norman Poh, Chi-Ho Chan, Josef Kittler, Séb...