Sciweavers

9503 search results - page 64 / 1901
» Authenticated System Calls
Sort
View
WCNC
2010
IEEE
15 years 8 months ago
Global Grassroots WiFi Sharing
— Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of...
Wolfgang Kieß, Till Elsner, Björn Scheu...
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 6 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
150
Voted
SEC
2008
15 years 6 months ago
Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks
Abstract The banking industry in Norway has developed a new security infrastructure for conducting commerce on the Internet. The initiative, called BankID, aims to become a nationa...
Yngve Espelid, Lars-Helge Netland, André N....
139
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Speaker authentication using video-based lip information
The lip-region can be interpreted as either a genetic or behavioural biometric trait depending on whether static or dynamic information is used. In this paper, we use a texture de...
Budhaditya Goswami, Chi-Ho Chan, Josef Kittler, Wi...
JEI
2008
135views more  JEI 2008»
15 years 4 months ago
Face authentication using a hybrid approach
This paper presents a hybrid approach to face-feature extraction based on the trace transform and the novel kernel partial-least-squares discriminant analysis (KPA). The hybrid app...
Vitomir Struc, France Mihelic, Nikola Pavesic