Sciweavers

78 search results - page 13 / 16
» Identity Verification by Using Handprint
Sort
View
AGI
2008
13 years 9 months ago
Cognitive Primitives for Automated Learning
Artificial Intelligence deals with the automated simulation of human intelligent behavior. Various aspects of human faculties are tackled using computational models. It is clear th...
Sudharsan Iyengar
ICSEA
2007
IEEE
14 years 1 months ago
An Access Control Metamodel for Web Service-Oriented Architecture
— With the mutual consent to use WSDL (Web Service Description Language) to describe web service interfaces and SOAP as the basic communication protocol, the cornerstone for web ...
Christian Emig, Frank Brandt, Sebastian Abeck, J&u...
TIFS
2008
145views more  TIFS 2008»
13 years 7 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 7 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford
SOUPS
2006
ACM
14 years 1 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...