Sciweavers

118 search results - page 12 / 24
» Efficient fingerprint-based user authentication for embedded...
Sort
View
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye
COLCOM
2007
IEEE
13 years 11 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
MKWI
2008
136views Business» more  MKWI 2008»
13 years 9 months ago
KASIMIR - Work process embedded task management leveraging the Semantic Desktop
: The effectiveness of semantic applications can be increased significantly if the system does not urge the users to take care of explicit semantic annotation creation. Today, sema...
Olaf Grebner, Ernie Ong, Uwe V. Riss
ICIAR
2004
Springer
14 years 1 months ago
Large Display Interaction Using Video Avatar and Hand Gesture Recognition
This paper presents a new system for interacting with a large display using live video avatar of a user and hand gesture recognition. The system enables a user to appear on a scree...
Sang Chul Ahn, Tae-Seong Lee, Ig-Jae Kim, Yong-Moo...
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...