Sciweavers

10044 search results - page 141 / 2009
» Authentication in Wireless Networks
Sort
View
77
Voted
ICNSC
2007
IEEE
15 years 6 months ago
A New Anti-Spam Protocol Using CAPTCHA
— Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred emails are spams. As a result, various methods have...
Sajad Shirali-Shahreza, Ali Movaghar
NETWORK
2011
14 years 2 months ago
SWATS: Wireless sensor networks for steamflood and waterflood pipeline monitoring
Sunhee Yoon, Wei Ye, John S. Heidemann, B. Littlef...
CORR
2007
Springer
144views Education» more  CORR 2007»
14 years 11 months ago
Heuristics for Network Coding in Wireless Networks
Multicast is a central challenge for emerging multi-hop wireless architectures such as wireless mesh networks, because of its substantial cost in terms of bandwidth. In this artic...
Song Yean Cho, Cedric Adjih, Philippe Jacquet
ICDAR
2009
IEEE
15 years 6 months ago
Machine Authentication of Security Documents
This paper presents a pioneering effort towards machine authentication of security documents like bank cheques, legal deeds, certificates, etc. that fall under the same class as f...
Utpal Garain, Biswajit Halder
93
Voted
ICPR
2008
IEEE
15 years 6 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma