Sciweavers

9503 search results - page 71 / 1901
» Authenticated System Calls
Sort
View
124
Voted
ICPR
2000
IEEE
16 years 5 months ago
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha
PAMI
2006
155views more  PAMI 2006»
15 years 4 months ago
Validating a Biometric Authentication System: Sample Size Requirements
Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Ofte...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
SOSP
1993
ACM
15 years 5 months ago
Authentication in the Taos Operating System
Edward Wobber, Martín Abadi, Michael Burrow...
SOSP
1989
ACM
15 years 5 months ago
A Logic of Authentication
Michael Burrows, Martín Abadi, Roger M. Nee...
148
Voted
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 10 months ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...