Sciweavers

766 search results - page 26 / 154
» How to Read a Signature
Sort
View
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 1 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
ITRUST
2005
Springer
14 years 1 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
SISW
2005
IEEE
14 years 1 months ago
Lazy Revocation in Cryptographic File Systems
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data sharing. We consider efficient key management s...
Michael Backes, Christian Cachin, Alina Oprea
ICONIP
2008
13 years 9 months ago
A Hybrid Fuzzy Approach for Human Eye Gaze Pattern Recognition
Abstract. Face perception and text reading are two of the most developed visual perceptual skills in humans. Understanding which features in the respective visual patterns make the...
Dingyun Zhu, B. Sumudu U. Mendis, Tom Gedeon, Aksh...
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh