Sciweavers

632 search results - page 36 / 127
» Two Facets of Authentication
Sort
View
POPL
2005
ACM
14 years 9 months ago
Inferring authentication tags
We present PEAR (Protocol Extendable AnalyzeR), a tool automating the two static analyses for authentication protocols presented in [7, 8]. These analyses are based on a tagging s...
Riccardo Focardi, Matteo Maffei, Francesco Placell...
FGR
2006
IEEE
134views Biometrics» more  FGR 2006»
14 years 3 months ago
Local Binary Patterns as an Image Preprocessing for Face Authentication
One of the major problem in face authentication systems is to deal with variations in illumination. In a realistic scenario, it is very likely that the lighting conditions of the ...
Guillaume Heusch, Yann Rodriguez, Sébastien...
ICMCS
2005
IEEE
112views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Authentic: Computerized Brushstroke Analysis
The paper provides insights into our efforts to develop techniques for the analysis of visual art. The AUTHENTIC project aims at creating a collection of software tools to support...
Igor Berezhnoy, Eric O. Postma, H. Jaap van den He...
JCP
2006
100views more  JCP 2006»
13 years 9 months ago
Biometric Gait Authentication Using Accelerometer Sensor
Abstract-- This paper presents a biometric user authentication based on a person's gait. Unlike most previous gait recognition approaches, which are based on machine vision te...
Davrondzhon Gafurov, Kirsi Helkala, Torkjel S&osla...
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 8 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa