Sciweavers

1018 search results - page 39 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2007
ACM
14 years 9 months ago
The VVIP system: encouraging the use of public transport in Edinburgh
This article is concerned with the encouragement and promotion of the use of buses in Edinburgh, especially among visually impaired users and tourists / migrant workers. The repor...
Darren James Thomson, Marius Gylseth, Robert McGar...
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 3 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
14 years 4 months ago
Remote haptic feedback from a dynamic running machine
— In this paper we present our efforts to design a system for feeding back useful haptic information from a highly dynamic running robot to a remote operator using a haptic devic...
Hanns Tappeiner, Sarjoun Skaff, Tomas Szabo, Ralph...
BMCBI
2006
145views more  BMCBI 2006»
13 years 9 months ago
Querying the public databases for sequences using complex keywords contained in the feature lines
Background: High throughput technologies often require the retrieval of large data sets of sequences. Retrieval of EMBL or GenBank entries using keywords is easy using tools such ...
Olivier Croce, Michaël Lamarre, Richard Chris...
SICHERHEIT
2008
13 years 10 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...