Sciweavers

411 search results - page 14 / 83
» User Authentication in Multidatabase Systems
Sort
View
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
13 years 9 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
MOBICOM
2012
ACM
11 years 10 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
ICC
2008
IEEE
14 years 2 months ago
Using Personal Electronic Device for Authentication-Based Service Access
Abstract—A person usually carries multiple authentication tokens in the form of various cards to access services electronically. Often the service outlets are equipped with a str...
Abhishek Gaurav, Ankit Sharma, Vikas Gelara, Rajat...
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 1 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 7 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti