Sciweavers

89 search results - page 7 / 18
» Keystroke dynamics for user authentication
Sort
View
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Efficient Recognition of Authentic Dynamic Facial Expressions on the Feedtum Database
In order to allow for fast recognition of a user’s affective state we discuss innovative holistic and self organizing approaches for efficient facial expression analysis. The f...
Frank Wallhoff, Björn Schuller, Michael Hawel...
CHI
2009
ACM
14 years 8 months ago
TypeRight: a keyboard with tactile error prevention
TYPERIGHT is a new tactile input device for text entry. It combines the advantages of tactile feedback with error prevention methods of word processors. TYPERIGHT extends the stan...
Alexander Hoffmann, Daniel Spelmezan, Jan O. Borch...
ISCAPDCS
2003
13 years 9 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
ADHOC
2007
134views more  ADHOC 2007»
13 years 7 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 8 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente