Sciweavers

632 search results - page 40 / 127
» Two Facets of Authentication
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 2 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
ICBA
2004
Springer
148views Biometrics» more  ICBA 2004»
14 years 2 months ago
Feature-Level Fusion for Effective Palmprint Authentication
Abstract. A feature-level fusion approach is proposed for improving the efficiency of palmprint identification. Multiple Gabor filters are employed to extract the phase information...
Adams Wai-Kin Kong, David Zhang
ISSE
2008
13 years 10 months ago
Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases
Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sect...
David Hernando, David Gómez, Javier Rodr&ia...
CCS
2007
ACM
14 years 3 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
IPPS
2006
IEEE
14 years 3 months ago
The interleaved authentication for filtering false reports in multipath routing based sensor networks
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor ne...
Youtao Zhang, Jim Yang, Hai T. Vu