Sciweavers

5 search results - page 1 / 1
» Two-Factor Authentication or How to Potentially Counterfeit ...
Sort
View
ICIAR
2010
Springer
13 years 9 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
COST
2009
Springer
155views Multimedia» more  COST 2009»
13 years 11 months ago
Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face
Nowadays biometrics becomes an important field in IT security, safety and comfort research for automotive. Aims are automatic driver authentication or recognition of spoken command...
Tobias Scheidat, Michael Biermann, Jana Dittmann, ...
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
13 years 11 months ago
Marketing Using Web 2.0
The increasing popularity of Web 2.0 tools, such as blogs, wikis, and virtual worlds, is fundamentally changing how consumers use the Web. The basic core of Web 2.0, that users ca...
Salvatore Parise, Patricia J. Guinan
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
13 years 11 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
13 years 9 months ago
Evaluating Support for Improvisation in Simulated Emergency Scenarios
Technological systems involving hazards are typically managed by experienced personnel guided by wellformulated, pre-determined procedures. These procedures are designed to ensure...
David Mendonça, Giampiero E. G. Beroggi, Wi...