Sciweavers

485 search results - page 8 / 97
» Continuous Spatial Authentication
Sort
View
TWC
2008
109views more  TWC 2008»
13 years 7 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ECCV
2004
Springer
14 years 1 months ago
Capacity and Examples of Template-Protecting Biometric Authentication Systems
Abstract. In this paper, we formulate the requirements for privacy protecting biometric authentication systems. The secrecy capacity Cs is investigated for the discrete and the con...
Pim Tuyls, Jasper Goseling
ILP
2005
Springer
14 years 1 months ago
Spatial Clustering of Structured Objects
Clustering is a fundamental task in Spatial Data Mining where data consists of observations for a site (e.g. areal units) descriptive of one or more (spatial) primary units, possib...
Donato Malerba, Annalisa Appice, Antonio Varlaro, ...
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Watermarking based Image Authentication using Feature Amplification
In a typical content and watermarking based image authentication approach, a feature is extracted from the given image, and then embedded back into the image using a watermarking ...
Shuiming Ye, Ee-Chien Chang, Qibin Sun