Sciweavers

24529 search results - page 107 / 4906
» Computing on Authenticated Data
Sort
View
MLMI
2005
Springer
15 years 7 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio
156
Voted
CVIU
2008
118views more  CVIU 2008»
15 years 2 months ago
Multimodal person authentication using speech, face and visual speech
This paper presents a method for automatic multimodal person authentication using speech, face and visual speech modalities. The proposed method uses the motion information to loc...
S. Palanivel, B. Yegnanarayana
UIST
2010
ACM
15 years 7 days ago
The IR ring: authenticating users' touches on a multi-touch display
Multi-touch displays are particularly attractive for collaborative work because multiple users can interact with applications simultaneously. However, unfettered access can lead t...
Volker Roth, Philipp Schmidt, Benjamin Gülden...
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 2 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
149
Voted
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 9 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner