Sciweavers

9503 search results - page 106 / 1901
» Authenticated System Calls
Sort
View
IJNSEC
2006
80views more  IJNSEC 2006»
15 years 5 months ago
A Forward-Secure User Authentication Scheme with Smart Cards
In 2004, Yoon et al. proposed a user authentication scheme based on generalized ElGamal signature scheme using smart cards. In their scheme, the previous session keys will be comp...
Bin Wang, Zheng-Quan Li
135
Voted
CHI
2009
ACM
15 years 11 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
KES
2007
Springer
15 years 11 months ago
An Open Source Java Framework for Biometric Web Authentication Based on BioAPI
One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The Bio...
Elisardo González-Agulla, Enrique Otero Mur...
141
Voted
FGR
2004
IEEE
149views Biometrics» more  FGR 2004»
15 years 8 months ago
Authentic Facial Expression Analysis
It is argued that for the computer to be able to interact with humans, it needs to have the communication skills of humans. One of these skills is the ability to understand the em...
Nicu Sebe, Michael S. Lew, Ira Cohen, Yafei Sun, T...
209
Voted
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain