Sciweavers

632 search results - page 54 / 127
» Two Facets of Authentication
Sort
View
WIS
2004
13 years 10 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
PAMI
2006
155views more  PAMI 2006»
13 years 8 months ago
Validating a Biometric Authentication System: Sample Size Requirements
Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Ofte...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
JCP
2007
117views more  JCP 2007»
13 years 8 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
JOC
2007
133views more  JOC 2007»
13 years 8 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ICQNM
2008
IEEE
138views Chemistry» more  ICQNM 2008»
14 years 3 months ago
Multiparty Distributed Compression of Quantum Information
—We study a protocol in which many parties use quantum communication to transfer a shared state to a receiver without communicating with each other. This protocol is a multiparty...
David Avis, Patrick Hayden, Ivan Savov