Sciweavers

78 search results - page 15 / 16
» Identity Verification by Using Handprint
Sort
View
NDSS
2002
IEEE
14 years 11 days ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
PRL
2002
142views more  PRL 2002»
13 years 7 months ago
Matching of palmprints
This paper investigates the feasibility of person identification based on feature points extracted from palmprint images. Our approach first extracts a set of feature points along...
Nicolae Duta, Anil K. Jain, Kanti V. Mardia
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
CVPR
2004
IEEE
14 years 9 months ago
Linear Model Hashing and Batch RANSAC for Rapid and Accurate Object Recognition
This paper proposes a joint feature-based model indexing and geometric constraint based alignment pipeline for efficient and accurate recognition of 3D objects from a large model ...
Ying Shan, Bogdan Matei, Harpreet S. Sawhney, Rake...
ACMSE
2004
ACM
14 years 26 days ago
Specification-driven automated testing of GUI-based Java programs
This paper presents a specification-driven approach to test automation for GUI-based JAVA programs as an alternative to the use of capture/replay. The NetBeans Jemmy library provi...
Yanhong Sun, Edward L. Jones