Sciweavers

1663 search results - page 223 / 333
» Privacy and Identity Management
Sort
View
ICISS
2007
Springer
15 years 8 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
CSMR
2004
IEEE
15 years 8 months ago
Using Split Objects for Maintenance and Reengineering Tasks
Language integration is an important issue in the area of software maintenance and reengineering. We describe a novel solution in this area: automatically applied and composed spl...
Uwe Zdun
KES
2000
Springer
15 years 8 months ago
Genetically optimised feedforward neural networks for speaker identification
The problem of establishing the identity of a speaker from a given utterance has been conventionally addressed using techniques such as Gaussian Mixture Models (GMM's) that m...
Richard C. Price, Jonathan P. Willmore, William J....
CIKM
2008
Springer
15 years 6 months ago
Leveraging social context for searching social media
The ability to utilize and benefit from today's explosion of social media sites depends on providing tools that allow users to productively participate. In order to participa...
Marc Smith, Vladimir Barash, Lise Getoor, Hady Wir...
146
Voted
ACISICIS
2005
IEEE
15 years 6 months ago
Palmprint Identification Algorithm Using Hu Invariant Moments and Otsu Binarization
Recently, Biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, th...
Jin Soo Noh, Kang Hyeon Rhee