Sciweavers

411 search results - page 15 / 83
» User Authentication in Multidatabase Systems
Sort
View
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 1 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
CCS
1999
ACM
13 years 12 months ago
Proof-Carrying Authentication
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks — including Taos, SPKI, SDSI,...
Andrew W. Appel, Edward W. Felten
WWW
2009
ACM
14 years 8 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
ICIP
1999
IEEE
14 years 9 months ago
Deformable Matching of Hand Shapes for User Verification
Wepresent a method for personal authentication based on deformable matching of hand shapes. Authentication systems are already employed in domains that require some sort of user v...
Anil K. Jain, Nicolae Duta