Sciweavers

1627 search results - page 162 / 326
» High Security Smartcards
Sort
View
CSI
2004
178views more  CSI 2004»
15 years 4 months ago
A flexible biometrics remote user authentication scheme
Recently, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is based on two tiers of ElGamal's...
Chu-Hsing Lin, Yi-Yi Lai
SERP
2010
15 years 2 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
HCI
2009
15 years 2 months ago
txteagle: Mobile Crowdsourcing
We present txteagle, a system that enables people to earn small amounts of money by completing simple tasks on their mobile phone for corporations who pay them in either airtime or...
Nathan Eagle
SPEECH
2011
14 years 11 months ago
SNR loss: A new objective measure for predicting the intelligibility of noise-suppressed speech
Most of the existing intelligibility measures do not account for the distortions present in processed speech, such as those introduced by speech-enhancement algorithms. In the pre...
Jianfen Ma, Philipos C. Loizou
JSAC
2010
188views more  JSAC 2010»
14 years 11 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...