Sciweavers

9503 search results - page 34 / 1901
» Authenticated System Calls
Sort
View
IJNSEC
2006
143views more  IJNSEC 2006»
15 years 4 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
ICMCS
2009
IEEE
85views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Text-independent compressed domain speaker verification for digital communication networks call monitoring
In this paper we present a text-independent automatic speaker verification system that works in the compressed domain using GSM AMR coded speech. While traditional approaches proc...
Matteo Petracca, Antonio Servetti, Juan Carlos De ...
HICSS
2005
IEEE
151views Biometrics» more  HICSS 2005»
15 years 10 months ago
Inheritance in the Presence of Asynchronous Method Calls
— This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However...
Einar Broch Johnsen, Olaf Owe
CHI
1996
ACM
15 years 8 months ago
MailCall: Message Presentation and Navigation in a Nonvisual Environment
MailCall is a telephone-based messaging system using speech recognition and synthesis. Its nonvisual interaction approaches the usability of visual systems through a combination o...
Matthew Marx, Chris Schmandt
ECIS
2004
15 years 5 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville