Sciweavers

9503 search results - page 123 / 1901
» Authenticated System Calls
Sort
View
DRM
2007
Springer
15 years 11 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
177
Voted
EUROPKI
2004
Springer
15 years 10 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
ICIP
2005
IEEE
16 years 6 months ago
Shape contexts and Gabor features for face description and authentication
In this paper, we use a robust shape matching algorithm for stablishing correspondences between points from face images, and Gabor vectors (jets) for feature computation. After ex...
Daniel González-Jiménez, José...
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
15 years 11 months ago
Support of Case-Based Authentic Learning Activities: A Collaborative Case Commenting Tool and a Collaborative Case Builder
Cases are widely used in professional education to engage learners with examples of real world practices. Collaboration in casebased learning can add to the authenticity of the ex...
Lu Xiao, John M. Carroll, Pat Clemson, Mary Beth R...
PADL
2001
Springer
15 years 9 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea