Sciweavers

9503 search results - page 96 / 1901
» Authenticated System Calls
Sort
View
DEON
2008
Springer
15 years 6 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
15 years 7 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
ICB
2007
Springer
136views Biometrics» more  ICB 2007»
15 years 11 months ago
Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation
Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure of simi...
Daniel González-Jiménez, Manuele Bic...
ICDAR
2009
IEEE
15 years 11 months ago
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition
A camera-based online signature verification system is proposed in this paper. One web camera is used for data acquisition, and a sequential Monte Carlo method is used for tracki...
Daigo Muramatsu, Kumiko Yasuda, Takashi Matsumoto
ICIP
2005
IEEE
16 years 6 months ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka