Sciweavers

411 search results - page 18 / 83
» User Authentication in Multidatabase Systems
Sort
View
SSWMC
2004
13 years 9 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
CHI
2008
ACM
14 years 8 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
PRL
2007
160views more  PRL 2007»
13 years 7 months ago
A 3D face and hand biometric system for robust user-friendly authentication
A complete authentication system based on fusion of 3D face and hand biometrics is presented and evaluated in this paper. The system relies on a low cost real-time sensor, which c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
COST
2009
Springer
95views Multimedia» more  COST 2009»
14 years 2 months ago
A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems
We propose a matching algorithm secure against the wolf attack in one-to-one biometric authentications. Our proposal algorithm first executes a one-to-all comparison using a conve...
Yoshihiro Kojima, Rie Shigetomi, Manabu Inuma, Aki...
P2P
2007
IEEE
110views Communications» more  P2P 2007»
14 years 1 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle