Sciweavers

632 search results - page 87 / 127
» Two Facets of Authentication
Sort
View
ICDAR
2003
IEEE
14 years 2 months ago
A Hybrid On/Off Line Handwritten Signature Verification System
This paper proposes a new hybrid handwritten signature verification system where the on-line reference data acquired through a digitizing tablet serves as the basis for the segmen...
Alessandro Zimmer, Luan Ling Lee
CIA
2003
Springer
14 years 2 months ago
Trust Networks on the Semantic Web
The so-called "Web of Trust" is one of the ultimate goals of the Semantic Web. Research on the topic of trust in this domain has focused largely on digital signatures, ce...
Jennifer Golbeck, Bijan Parsia, James A. Hendler
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
14 years 1 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
FPL
2009
Springer
105views Hardware» more  FPL 2009»
14 years 1 months ago
Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators
A silicon Physical Unclonable Function (PUF), which is a die-unique challenge-response function, is an emerging hardware primitive for secure applications. It exploits manufacturi...
Abhranil Maiti, Patrick Schaumont
STOC
1999
ACM
122views Algorithms» more  STOC 1999»
14 years 1 months ago
Oblivious Transfer and Polynomial Evaluation
Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input is a polynomial P, and a receiver whose input is a value α. At the end of the protocol t...
Moni Naor, Benny Pinkas