Sciweavers

45 search results - page 3 / 9
» Agent-Based Security System for User Verification
Sort
View
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 6 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
ICASSP
2008
IEEE
13 years 12 months ago
Dynamic signature verification with template protection using helper data
A biometric template protection system for dynamic signature veri cation is presented. The approach uses auxiliary (helper) data that allows the matching with secure templates but...
Manuel R. Freire, Julian Fiérrez, Javier Or...
PR
2010
141views more  PR 2010»
13 years 4 days ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
13 years 11 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ICMCS
2007
IEEE
118views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Cascading Multimodal Verification using Face, Voice and Iris Information
In this paper we propose a novel fusion strategy which fuses information from multiple physical traits via a cascading verification process. In the proposed system users are veri...
Ping-Han Lee, Lu-Jong Chu, Yi-Ping Hung, Sheng-Wen...