Sciweavers

574 search results - page 17 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
AVSS
2006
IEEE
14 years 3 months ago
On Person Authentication by Fusing Visual and Thermal Face Biometrics
Recognition algorithms that use data obtained by imaging faces in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often present...
Ognjen Arandjelovic, Riad I. Hammoud, Roberto Cipo...
ICPR
2000
IEEE
14 years 11 months ago
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha
CSREASAM
2006
13 years 11 months ago
MRAS: A Multi-Layered Remote Authentication System
: Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate prog...
Wilfrid Mirville, Jamie Kobie, Michael Nelson
CCS
2008
ACM
13 years 11 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
ICICS
2005
Springer
14 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...