Sciweavers

1150 search results - page 179 / 230
» Beacon Based Authentication
Sort
View
MAS
1998
Springer
152views Communications» more  MAS 1998»
14 years 1 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
VW
1998
Springer
171views Virtual Reality» more  VW 1998»
14 years 29 days ago
Las Meninas in VR: Storytelling and the Illusion in Art
Las Meninas is a virtual reality (VR) artwork based on the painting of the same name by Spanish painter Diego Velazquez. Created for the CAVE(tm), Las Meninas attempts to establis...
Hisham Bizri, Andrew E. Johnson, Christina Vasilak...
AVBPA
2003
Springer
148views Biometrics» more  AVBPA 2003»
14 years 13 days ago
Scalability Analysis of Audio-Visual Person Identity Verification
In this work, we present a multimodal identity verification system based on the fusion of the face image and the text independent speech data of a person. The system conciliates th...
Jacek Czyz, Samy Bengio, Christine Marcel, Luc Van...
POPL
2000
ACM
14 years 10 days ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
ISW
1997
Springer
14 years 10 days ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng