Sciweavers

35 search results - page 3 / 7
» AwareLESS authentication: insensible input based authenticat...
Sort
View
ICIAP
2003
ACM
14 years 6 months ago
Multimodal biometric authentication using quality signals in mobile communications
The elements of multimodal authentication along with system models are presented. These include the machine experts as well as machine supervisors. In particular fingerprint and s...
Josef Bigün, Julian Fiérrez-Aguilar, J...
CRYPTO
2003
Springer
98views Cryptology» more  CRYPTO 2003»
13 years 11 months ago
A Message Authentication Code Based on Unimodular Matrix Groups
We present a new construction based on modular groups. A novel element of our construction is to embed each input into a sequence of matrices with determinant ±1, the product of w...
Matthew Cary, Ramarathnam Venkatesan
FGR
2006
IEEE
134views Biometrics» more  FGR 2006»
14 years 11 days ago
Local Binary Patterns as an Image Preprocessing for Face Authentication
One of the major problem in face authentication systems is to deal with variations in illumination. In a realistic scenario, it is very likely that the lighting conditions of the ...
Guillaume Heusch, Yann Rodriguez, Sébastien...
CHI
2008
ACM
14 years 6 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
ICC
2008
IEEE
176views Communications» more  ICC 2008»
14 years 23 days ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa