Sciweavers

9503 search results - page 95 / 1901
» Authenticated System Calls
Sort
View
MSWIM
2006
ACM
15 years 11 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ICPR
2008
IEEE
16 years 6 months ago
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation
The proliferation of handheld devices such as PDAs and smartphones represents a new scenario for automatic signature verification. Traditionally, research on signature verificatio...
Marcos Martinez-Diaz, Julian Fiérrez-Aguila...
126
Voted
CRV
2006
IEEE
242views Robotics» more  CRV 2006»
15 years 11 months ago
User Authentication based on Face Recognition with Support Vector Machines
The present paper proposes an authentication scheme which relies on face biometrics and one-class Support Vector Machines. The proposed recognition procedures are based on both a ...
Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandr...
177
Voted
PR
2006
167views more  PR 2006»
15 years 4 months ago
Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system's accuracy. Despite many works in the literature, it is surprising t...
Norman Poh, Samy Bengio
ICNP
2006
IEEE
15 years 11 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang