Sciweavers

485 search results - page 51 / 97
» Authentication by Biometric Verification
Sort
View
ICBA
2004
Springer
126views Biometrics» more  ICBA 2004»
15 years 3 months ago
Spectral Subband Centroids as Complementary Features for Speaker Authentication
Most conventional features used in speaker authentication are based on estimation of spectral envelopes in one way or another, e.g., Mel-scale Filterbank Cepstrum Coefficients (MFC...
Norman Poh Hoon Thian, Conrad Sanderson, Samy Beng...
WS
2004
ACM
15 years 3 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
IWBRS
2005
Springer
145views Biometrics» more  IWBRS 2005»
15 years 3 months ago
Face Authentication Using One-Class Support Vector Machines
Abstract. This paper proposes a new method for personal identity verification based the analysis of face images applying One Class Support Vector Machines. This is a recently intr...
Manuele Bicego, Enrico Grosso, Massimo Tistarelli
IDTRUST
2009
ACM
15 years 4 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 9 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...