Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
PAMI
2007
97views more  PAMI 2007»
10 years 2 months ago
Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. The current paper introduces a novel statistical me...
Sinjini Mitra, Marios Savvides, Anthony Brockwell
ICIAR
2010
Springer
10 years 7 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Diļ¬€erent factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
IBPRIA
2003
Springer
10 years 7 months ago
A User Authentication Technic Using a~Web Interaction Monitoring System
User authentication based on biometrics has explored both physiological and behavioral characteristics. We present a system, called Web Interaction Display and Monitoring (WIDAM), ...
Hugo Gamboa, Ana L. N. Fred
IV
2006
IEEE
95views Visualization» more  IV 2006»
10 years 8 months ago
A Pragmatic and Musically Pleasing Production System for Sonic Events
We describe a novel application for sonic events namely their generation via mathematical functions implemented on a universal all purpose Java platform. Their design is driven by...
Marc Conrad, Tim French, Marcia Gibson
IPPS
2007
IEEE
10 years 8 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
11 years 3 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
books