Sciweavers

202 search results - page 32 / 41
» Face Authentication for Banking
Sort
View
SBACPAD
2005
IEEE
139views Hardware» more  SBACPAD 2005»
14 years 1 months ago
Chained In-Order/Out-of-Order DoubleCore Architecture
Complexity is one of the most important problems facing microarchitects. It is exacerbated by the application of optimizations, by scaling to higher issue widths and, in general, ...
Miquel Pericàs, Adrián Cristal, Rube...
MOBISYS
2007
ACM
14 years 7 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 9 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
WISA
2009
Springer
14 years 2 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
FC
2009
Springer
142views Cryptology» more  FC 2009»
14 years 2 months ago
Passwords: If We're So Smart, Why Are We Still Using Them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...