Sciweavers

9503 search results - page 113 / 1901
» Authenticated System Calls
Sort
View
188
Voted
IJNSEC
2008
145views more  IJNSEC 2008»
15 years 5 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao
ICMLA
2009
16 years 2 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
COST
2009
Springer
155views Multimedia» more  COST 2009»
15 years 11 months ago
Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face
Nowadays biometrics becomes an important field in IT security, safety and comfort research for automotive. Aims are automatic driver authentication or recognition of spoken command...
Tobias Scheidat, Michael Biermann, Jana Dittmann, ...
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
15 years 11 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
ICB
2007
Springer
124views Biometrics» more  ICB 2007»
15 years 11 months ago
Face Authentication with Salient Local Features and Static Bayesian Network
In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and ...
Guillaume Heusch, Sébastien Marcel