Sciweavers

574 search results - page 107 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
HIKM
2006
ACM
14 years 1 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...
PDPTA
2008
13 years 9 months ago
A GridFTP Transport Driver for Globus XIO
GridFTP is a high-performance, reliable data transfer protocol optimized for high-bandwidth wide-area networks. Based on the Internet FTP protocol, it defines extensions for highp...
Rajkumar Kettimuthu, Wantao Liu, Joseph M. Link, J...
SRDS
2010
IEEE
13 years 5 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
AVBPA
2005
Springer
266views Biometrics» more  AVBPA 2005»
14 years 1 months ago
A Hybrid Swipe Fingerprint Mosaicing Scheme
Due to their very small contact areas and low cost, swipe fingerprint sensors provide the very convenient and reliable fingerprint security solutions and are being increasingly u...
Yongliang Zhang, Jie Yang, Hongtao Wu
NDSS
2006
IEEE
14 years 1 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...