Sciweavers

1466 search results - page 85 / 294
» Completeness of the Authentication Tests
Sort
View
ICIAP
2007
ACM
14 years 2 months ago
Score-level fusion of fingerprint and face matchers for personal verification under "stress" conditions
Fusion of multiple face and fingerprint matchers based on different biometrics for personal authentication has been investigated in the last years. However, the performance achiev...
Gian Luca Marcialis, Fabio Roli
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
14 years 2 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
AINA
2005
IEEE
14 years 1 months ago
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications
In the present study, THUBioGrid, an experimental distributed computing application for bioinformatics (BioGrid) is proposed. THUBioGrid incorporates directory services (data and ...
Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
14 years 1 months ago
A Reversible Watermarking Scheme for JPEG-2000 Compressed Images
In this paper, we present a novel reversible watermarking scheme for image authentication for JPEG/JPEG-2000 coded images. Since the watermarking scheme is reversible, the exact o...
Sabu Emmanuel, Chee Kiang Heng, Amitabha Das
ITRE
2005
IEEE
14 years 1 months ago
Integrated use of Web technologies to deliver a secure collaborative Web portal
This paper describes the design and operation of the OMII web site, which has to date achieved three major targets. The first target is the successful integrations in different te...
Victor Chang