Sciweavers

485 search results - page 93 / 97
» Authentication by Biometric Verification
Sort
View
PDCAT
2005
Springer
14 years 26 days ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
ICISS
2007
Springer
13 years 11 months ago
Performance Analysis for Multi Sensor Fingerprint Recognition System
The increasing use of distributed authentication architecture has made interoperability of systems an important issue. Interoperability of systems reflects the maturity of the tech...
Shimon K. Modi, Stephen J. Elliott, Hakil Kim
MCS
2010
Springer
13 years 9 months ago
Multiple Classifier Systems under Attack
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Battista Biggio, Giorgio Fumera, Fabio Roli
CORR
2008
Springer
138views Education» more  CORR 2008»
13 years 7 months ago
An Improved Robust Fuzzy Extractor
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W to agree on a secret key R in the presence of an active ...
Bhavana Kanukurthi, Leonid Reyzin
ISI
2006
Springer
13 years 7 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen