Sciweavers

1018 search results - page 86 / 204
» Remote User Authentication Using Public Information
Sort
View
CIARP
2003
Springer
14 years 1 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
CCS
2004
ACM
14 years 1 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
BMCBI
2006
144views more  BMCBI 2006»
13 years 8 months ago
ProFAT: a web-based tool for the functional annotation of protein sequences
Background: The functional annotation of proteins relies on published information concerning their close and remote homologues in sequence databases. Evidence for remote sequence ...
Charles Richard Bradshaw, Vineeth Surendranath, Bi...
WWW
2006
ACM
14 years 8 months ago
Learning and inferencing in user ontology for personalized semantic web services
Domain ontology has been used in many Semantic Web applications. However, few applications explore the use of ontology for personalized services. This paper proposes an ontology b...
Xing Jiang, Ah-Hwee Tan
PAM
2007
Springer
14 years 2 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston