Sciweavers

1573 search results - page 22 / 315
» Strong User Authentication
Sort
View
CVPR
2012
IEEE
12 years 1 months ago
Keystroke dynamics for user authentication
In this paper we investigate the problem of user authentication using keystroke biometrics. A new distance metric that is effective in dealing with the challenges intrinsic to key...
Yu Zhong, Yunbin Deng, Anil K. Jain
DEXAW
1998
IEEE
82views Database» more  DEXAW 1998»
14 years 3 months ago
User Authentication in Multidatabase Systems
The aspect of security needs more consideration in the area of architectures for multidatabase systems. Particularly, the authentication of users which is a main prerequisite for ...
Eyk Hildebrandt, Gunter Saake
EUROPKI
2004
Springer
14 years 4 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
ICC
2008
IEEE
176views Communications» more  ICC 2008»
14 years 5 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 11 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...