Sciweavers

9503 search results - page 27 / 1901
» Authenticated System Calls
Sort
View
ICCTA
2007
IEEE
15 years 10 months ago
Modeling Time-Varying Population for Biometric Authentication
Population size plays a major role in determining the performance of any biometric authentication system, particularly when such systems are used for civilian applications. In thi...
Vandana Roy, C. V. Jawahar
AVBPA
2003
Springer
184views Biometrics» more  AVBPA 2003»
15 years 9 months ago
Biometric Template Selection: A Case Study in Fingerprints
Abstract. A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a ...
Anil K. Jain, Umut Uludag, Arun Ross
PERCOM
2009
ACM
15 years 11 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
SOSP
2003
ACM
16 years 1 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
PERVASIVE
2007
Springer
15 years 10 months ago
Objects Calling Home: Locating Objects Using Mobile Phones
Locating physical items is a highly relevant application addressed by numerous systems. Many of these systems share the drawback that costly infrastructure must be installed before...
Christian Frank, Philipp Bolliger, Christof Rodune...