Sciweavers

574 search results - page 72 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
ICB
2009
Springer
173views Biometrics» more  ICB 2009»
13 years 7 months ago
Bayesian Networks to Combine Intensity and Color Information in Face Recognition
We present generative models dedicated to face recognition. Our models consider data extracted from color face images and use Bayesian Networks to model relationships between diffe...
Guillaume Heusch, Sébastien Marcel
HICSS
1994
IEEE
127views Biometrics» more  HICSS 1994»
14 years 2 months ago
Angel: Resource Unification in a.64-bit Microkernel
The appearance of 64-bit processors allows a new approach to microkernel desagn From our experience with a message passang microkernel MESHIX, we discovered that a multi-address s...
Kevin Murray, Tim Wilkinson, Tom Stiemerling, Paul...
HICSS
2003
IEEE
104views Biometrics» more  HICSS 2003»
14 years 3 months ago
Science Investigation System for Telescopes in Education Research
The Virtual Telescopes in Education (VTIE) project, is providing tools for teaching astronomy in K-12 classrooms using remotely controlled telescopes. VTIE's main goal to pro...
Susan Hoban, John G. Keating, Joel Sachs, Daniel L...
CCS
2004
ACM
14 years 3 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
JDCTA
2008
535views more  JDCTA 2008»
13 years 10 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...