Sciweavers

574 search results - page 69 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
ISSA
2008
13 years 11 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
WEBI
2009
Springer
14 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
14 years 1 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
PAM
2007
Springer
14 years 4 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
FGR
2008
IEEE
141views Biometrics» more  FGR 2008»
14 years 4 months ago
Markerless view independent gait analysis with self-camera calibration
We present a new method for viewpoint independent markerless gait analysis. The system uses a single camera, does not require camera calibration and works with a wide range of dir...
Michela Goffredo, Richard D. Seely, John N. Carter...