Sciweavers

632 search results - page 38 / 127
» Two Facets of Authentication
Sort
View
ICISS
2007
Springer
14 years 24 days ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
BIOID
2008
130views Biometrics» more  BIOID 2008»
13 years 11 months ago
Quality-Based Score Normalization and Frame Selection for Video-Based Person Authentication
This paper addresses the incorporation of quality measures to video-based person authentication. A theoretical framework to incorporate quality measures in biometric authentication...
Enrique Argones-Rúa, José Luis Alba-...
DAM
2006
97views more  DAM 2006»
13 years 9 months ago
Entity authentication schemes using braid word reduction
Abstract. Artin's braid groups currently provide a promising background for cryptographical applications, since the first cryptosystems using braids were introduced in [2, 3, ...
Hervé Sibert, Patrick Dehornoy, Marc Giraul...
ICIP
2006
IEEE
14 years 10 months ago
Real Time Lip Motion Analysis for a Person Authentication System using Near Infrared Illumination
In this paper we present an approach for lip motion analysis that can be used in conjunction with a person authentication system based on face recognition, to avoid attacks on the...
Faisal Shafait, Ralph Kricke, Islam Shdaifat, Rolf...
ICIP
2002
IEEE
14 years 10 months ago
Likelihood normalization for face authentication in variable recording conditions
In this paper we evaluate the effectiveness of two likelihood normalization techniques, the Background Model Set (BMS) and the Universal Background Model (UBM), for improving perf...
Kuldip K. Paliwal, Conrad Sanderson