Sciweavers

485 search results - page 72 / 97
» Authentication by Biometric Verification
Sort
View
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
15 years 1 months ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
15 years 11 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
CF
2007
ACM
15 years 1 months ago
Accelerating memory decryption and authentication with frequent value prediction
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have...
Weidong Shi, Hsien-Hsin S. Lee
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
14 years 9 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
MOBIHOC
2005
ACM
15 years 9 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning