Sciweavers

1466 search results - page 84 / 294
» Completeness of the Authentication Tests
Sort
View
DSN
2009
IEEE
14 years 3 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
ICIP
2006
IEEE
14 years 10 months ago
Fingerprint Indexing Based on LAS Registration
Fingerprint indexing is an efficient technique that greatly improves the performance of fingerprint based person authentication systems by reducing the number of comparison. In th...
Tong Liu, Chao Zhang, Pengwei Hao
PERCOM
2006
ACM
14 years 7 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
CISIM
2007
IEEE
14 years 2 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
ICASSP
2007
IEEE
14 years 2 months ago
The Biosecure Geometry-Based System for Hand Modality
We present an identification and authentication system based on hand modality which is part of a reference system for all modalities developed within the Biosecure consortium. It...
Geoffroy Fouquier, Laurence Likforman-Sulem, J&eac...