Sciweavers

78 search results - page 9 / 16
» Identity Verification by Using Handprint
Sort
View
CADE
2006
Springer
14 years 7 months ago
Automatic Construction and Verification of Isotopy Invariants
Abstract. We extend our previous study of the automatic construction of isomorphic classification theorems for algebraic domains by considering the isotopy equivalence relation. Is...
Volker Sorge, Andreas Meier, Roy L. McCasland, Sim...
ICCD
2008
IEEE
119views Hardware» more  ICCD 2008»
14 years 4 months ago
Hierarchical simulation-based verification of Anton, a special-purpose parallel machine
—One of the major design verification challenges in the development of Anton, a massively parallel special-purpose machine for molecular dynamics, was to provide evidence that co...
John P. Grossman, John K. Salmon, Richard C. Ho, D...
PR
2010
220views more  PR 2010»
13 years 5 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
CSI
2008
75views more  CSI 2008»
13 years 7 months ago
Identity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simpli...
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, D...
SAINT
2003
IEEE
14 years 22 days ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta