Sciweavers

335 search results - page 49 / 67
» Biometrics and Security
Sort
View
115
Voted
BIOSIG
2003
89views Biometrics» more  BIOSIG 2003»
15 years 3 months ago
How to Test the Performance of Speech Verifiers and Statistical Evaluation
Abstract: Biometric identification and verification technologies, in the past, have promised high performance levels. Such performance statements lead to the assumption, that these...
Jörg Tacke, Andreas Wolf
99
Voted
AINA
2007
IEEE
15 years 8 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
156
Voted
WIS
2004
15 years 3 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
128
Voted
HICSS
2008
IEEE
109views Biometrics» more  HICSS 2008»
15 years 8 months ago
Web-Based Service Exchange System for Agents and Humans Alike
Semantic Web research aims at bridging the gap between how humans and agents process information readily available on the Internet. One of the great challenges to this goal lies i...
Evens Jean, Machigar Ongtang, Ali R. Hurson
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 8 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...