Sciweavers

1150 search results - page 48 / 230
» Beacon Based Authentication
Sort
View
ICB
2007
Springer
136views Biometrics» more  ICB 2007»
14 years 3 months ago
Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation
Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure of simi...
Daniel González-Jiménez, Manuele Bic...
ICDAR
2009
IEEE
14 years 3 months ago
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition
A camera-based online signature verification system is proposed in this paper. One web camera is used for data acquisition, and a sequential Monte Carlo method is used for tracki...
Daigo Muramatsu, Kumiko Yasuda, Takashi Matsumoto
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 2 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
INDOCRYPT
2005
Springer
14 years 2 months ago
Anonymous Password-Based Authenticated Key Exchange
Duong Viet, Akihiro Yamamura, Hidema Tanaka
PKC
2005
Springer
90views Cryptology» more  PKC 2005»
14 years 2 months ago
Password-Based Authenticated Key Exchange in the Three-Party Setting
Michel Abdalla, Pierre-Alain Fouque, David Pointch...