Sciweavers

796 search results - page 31 / 160
» Spoofing prevention method
Sort
View
ICASSP
2010
IEEE
13 years 8 months ago
Sectored Random Projections for Cancelable Iris Biometrics
Privacy and security are essential requirements in practical biometric systems. In order to prevent the theft of biometric patterns, it is desired to modify them through revocable...
Jaishanker K. Pillai, Vishal M. Patel, Rama Chella...
CAV
2009
Springer
153views Hardware» more  CAV 2009»
14 years 10 months ago
Browser-Based Enforcement of Interface Contracts in Web Applications with BeepBeep
Abstract. BeepBeep is a lightweight runtime monitor for Ajax web applications. Interface specifications are expressed internally in an extension of LTL with first-order quantificat...
Sylvain Hallé, Roger Villemaire
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 4 months ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...
ICRA
2006
IEEE
181views Robotics» more  ICRA 2006»
14 years 3 months ago
Balanced Micro/Macro Contact Model for Forward Dynamics of Rigid Multibody
— This paper proposes a computational method of contact forces working between multibody system and environment in forward dynamics based on both the microbody-deformation model ...
Tomomichi Sugihara, Yoshihiko Nakamura
PKC
1999
Springer
211views Cryptology» more  PKC 1999»
14 years 2 months ago
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key confirmation. Various me...
Simon Blake-Wilson, Alfred Menezes