Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Photo image authentication is an interesting and demanding field in the computer vision and image processing community. This research is motivated by its wide range of application...
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
More and more research have been developed very recently for automatic hand recognition. This paper proposes a new method for contactless hand authentication in complex images. Ou...
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...