Sciweavers

181 search results - page 15 / 37
» Improving multi-tier security using redundant authentication
Sort
View
JCP
2006
120views more  JCP 2006»
13 years 8 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
13 years 10 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
ICIP
2005
IEEE
14 years 9 months ago
Generalized optimal thresholding for biometric key generation using face images
1 In this paper, we study biometric key generation using face images. Given a face image, a set of biometric features are extracted. Each feature is compared with a threshold to ge...
Wende Zhang, Tsuhan Chen
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
13 years 8 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
DAC
2005
ACM
14 years 9 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...