Sciweavers

574 search results - page 50 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
FGR
2004
IEEE
149views Biometrics» more  FGR 2004»
14 years 1 months ago
Authentic Facial Expression Analysis
It is argued that for the computer to be able to interact with humans, it needs to have the communication skills of humans. One of these skills is the ability to understand the em...
Nicu Sebe, Michael S. Lew, Ira Cohen, Yafei Sun, T...
ICPR
2010
IEEE
13 years 7 months ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...
ICDCS
2006
IEEE
14 years 4 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
MDAI
2005
Springer
14 years 3 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
SIGMOD
2006
ACM
174views Database» more  SIGMOD 2006»
14 years 10 months ago
Dynamic authenticated index structures for outsourced databases
In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to acce...
Feifei Li, Marios Hadjieleftheriou, George Kollios...