Sciweavers

574 search results - page 44 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
TCSV
2008
156views more  TCSV 2008»
13 years 9 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
HICSS
1994
IEEE
155views Biometrics» more  HICSS 1994»
14 years 2 months ago
Concurrent Simulation and Control of Robot Tasks
In the area of telerobotics, where remote systems are to be controlled, it is helpful to plan subsequent operations based on as much relevant data as possible. The simulation of t...
Ulrich Mehlhaus
IJOE
2008
98views more  IJOE 2008»
13 years 10 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
KES
2007
Springer
14 years 4 months ago
Hand Geometry Verification Using Time Series Representation
Biometric authentication based on human physical traits has recently been heavily studied; these biometric sources include face, hand geometry, voice, fingerprint, iris, retina, et...
Vit Niennattrakul, Dachawut Wanichsan, Chotirat An...
CCS
2003
ACM
14 years 3 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...