Sciweavers

411 search results - page 27 / 83
» User Authentication in Multidatabase Systems
Sort
View
121
Voted
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
15 years 11 days ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye
104
Voted
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 9 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
163
Voted
ICMLA
2009
15 years 11 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
114
Voted
ICVGIP
2008
15 years 4 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi
129
Voted
DIM
2008
ACM
15 years 4 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel