Sciweavers

97 search results - page 11 / 20
» Biometric yet Privacy Protecting Person Authentication
Sort
View
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
14 years 2 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba
ICIAP
2007
ACM
14 years 4 months ago
Score-level fusion of fingerprint and face matchers for personal verification under "stress" conditions
Fusion of multiple face and fingerprint matchers based on different biometrics for personal authentication has been investigated in the last years. However, the performance achiev...
Gian Luca Marcialis, Fabio Roli
JSW
2007
124views more  JSW 2007»
13 years 9 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
CISIM
2007
IEEE
14 years 4 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
WWW
2008
ACM
14 years 10 months ago
Privacy-enhanced sharing of personal content on the web
Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and host...
Mohammad Mannan, Paul C. van Oorschot