Sciweavers

33 search results - page 2 / 7
» IC Activation and User Authentication for Security-Sensitive...
Sort
View
ICASSP
2011
IEEE
12 years 8 months ago
Continuous pilot based adaptive estimation for IDMA systems on underwater acoustic channels
Two adaptive receivers for jointly detecting active users in an interleave division multiple access (IDMA) system are considered for highly dispersive underwater acoustic channels...
Salah Aliesawi, Charalampos C. Tsimenidis, Bayan S...
WISEC
2010
ACM
13 years 5 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
BIOSIG
2003
140views Biometrics» more  BIOSIG 2003»
13 years 6 months ago
Multifactor Biometric Sketch Authentication
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...
Arslan Brömme, Stephan Al-Zubi
CASES
2008
ACM
13 years 7 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
13 years 10 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...