Sciweavers

485 search results - page 76 / 97
» Authentication by Biometric Verification
Sort
View
FCS
2006
13 years 8 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu
WPES
2003
ACM
14 years 20 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
WSCG
2004
143views more  WSCG 2004»
13 years 8 months ago
Palmprint Verification with Moments
Palmprint verification is an approach for verifying a palmprint input by matching the input to the claimed identity template stored in a database. If the dissimilarity measure bet...
Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Che...
WORM
2003
13 years 8 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICARCV
2008
IEEE
222views Robotics» more  ICARCV 2008»
14 years 1 months ago
Robust fusion using boosting and transduction for component-based face recognition
—Face recognition performance depends upon the input variability as encountered during biometric data capture including occlusion and disguise. The challenge met in this paper is...
Fayin Li, Harry Wechsler, Massimo Tistarelli