Sciweavers

1573 search results - page 23 / 315
» Strong User Authentication
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 4 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
FC
2005
Springer
80views Cryptology» more  FC 2005»
14 years 4 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 5 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
NDSS
2003
IEEE
14 years 4 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
UIST
2010
ACM
13 years 8 months ago
The IR ring: authenticating users' touches on a multi-touch display
Multi-touch displays are particularly attractive for collaborative work because multiple users can interact with applications simultaneously. However, unfettered access can lead t...
Volker Roth, Philipp Schmidt, Benjamin Gülden...