Sciweavers

411 search results - page 38 / 83
» User Authentication in Multidatabase Systems
Sort
View
AICT
2010
IEEE
240views Communications» more  AICT 2010»
13 years 15 days ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
14 years 3 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
CHI
2009
ACM
14 years 9 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
CHI
1997
ACM
14 years 1 months ago
Supporting Knowledge Workers Beyond the Desktop With Palplates
Palplates are a collection of touch-screen terminals placed around the office enabling human-computer interactions at the point of need. Supporting a community of mobile authentic...
Jennifer Mankoff, Bill N. Schilit
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
14 years 3 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri