Sciweavers

286 search results - page 5 / 58
» Authentication in the Taos Operating System
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 7 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 7 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 1 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi
JMM2
2006
133views more  JMM2 2006»
13 years 7 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu
ICRA
2002
IEEE
70views Robotics» more  ICRA 2002»
14 years 14 days ago
The Operational Space Formulation Implementation to Aircraft Canopy Polishing using a Mobile Manipulator
The Operational Space Formulation creates a framework for the analysis and control of manipulator systems with respect to the behavior of their end-effectors. Its application to ...
Rodrigo S. Jamisola, Marcelo H. Ang, Denny Oetomo,...