Sciweavers

24529 search results - page 10 / 4906
» Computing on Authenticated Data
Sort
View
ICPR
2000
IEEE
14 years 11 months ago
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha
CVPR
2012
IEEE
12 years 7 days ago
Keystroke dynamics for user authentication
In this paper we investigate the problem of user authentication using keystroke biometrics. A new distance metric that is effective in dealing with the challenges intrinsic to key...
Yu Zhong, Yunbin Deng, Anil K. Jain
OZCHI
2006
ACM
14 years 3 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
ACISP
2007
Springer
14 years 1 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
ICPR
2006
IEEE
14 years 11 months ago
Motion Features from Lip Movement for Person Authentication
This paper describes a new motion based feature extraction technique for speaker identification using orientation estimation in 2D manifolds. The motion is estimated by computing ...
Josef Bigün, Maycel Isaac Faraj