Sciweavers

632 search results - page 61 / 127
» Two Facets of Authentication
Sort
View
DIM
2006
ACM
14 years 2 months ago
OpenID 2.0: a platform for user-centric identity management
With the advancement in user-centric and URI-based identity systems over the past two years, it has become clear that a single specification will not be the solution to all proble...
David Recordon, Drummond Reed
ICBA
2004
Springer
205views Biometrics» more  ICBA 2004»
14 years 2 months ago
Combining Fingerprint and Voiceprint Biometrics for Identity Verification: an Experimental Comparison
Combining multiple biometrics may enhance the performance of personal authentication system in accuracy and reliability. In this paper, we compare 13 combination methods in the con...
Yuan Wang, Yunhong Wang, Tieniu Tan
CAIP
2009
Springer
325views Image Analysis» more  CAIP 2009»
14 years 3 months ago
Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation
This paper investigates a new automated personal authentication technique using finger-knuckle-print (FKP) imaging. First, a specific data acquisition device is developed to captur...
Lin Zhang, Lei Zhang, David Zhang
ICDAR
2003
IEEE
14 years 2 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
14 years 2 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert