Sciweavers

1018 search results - page 40 / 204
» Remote User Authentication Using Public Information
Sort
View
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 4 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
TWC
2008
109views more  TWC 2008»
13 years 9 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
JCP
2006
118views more  JCP 2006»
13 years 9 months ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
AINA
2006
IEEE
14 years 3 months ago
Home Appliance Translator for Remote Control of Conventional Home Appliance
Abstract— We developed the HAT (Home Appliance Translator) and HAT-Sub to enable conventional appliances without telecommunication capabilities to connect to home networks. The d...
Hiroshi Kuriyama, Hiroshi Mineno, Tadanori Mizuno,...
CHI
2003
ACM
14 years 9 months ago
Semi-public displays for small, co-located groups
The majority of systems using public displays to foster awareness have focused on providing information across remote locations or among people who are loosely connected and lack ...
Elaine M. Huang, Elizabeth D. Mynatt