Sciweavers

221 search results - page 8 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
ICMCS
2006
IEEE
124views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Content-Free Image Retrieval using Bayesian Product Rule
Content-free image retrieval uses accumulated user feedback records to retrieve images without analyzing image pixels. We present a Bayesian-based algorithm to analyze user feedba...
David Liu, Tsuhan Chen
SOUPS
2010
ACM
14 years 9 days ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
WISEC
2009
ACM
14 years 3 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
MOBICOM
2012
ACM
11 years 11 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
ICIAP
2007
ACM
14 years 2 months ago
Dynamic Score Selection for Fusion of Multiple Biometric Matchers
A biometric system for user authentication produces a matching score representing the degree of similarity of the input biometry with the set of templates for that user. If the sc...
Roberto Tronci, Giorgio Giacinto, Fabio Roli