Sciweavers

335 search results - page 55 / 67
» Biometrics and Security
Sort
View
SPW
2004
Springer
15 years 7 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano
ICBA
2004
Springer
143views Biometrics» more  ICBA 2004»
15 years 7 months ago
Externalized Fingerprint Matching
The 9/11 tragedy triggered an increased interest in biometric passports. According to several sources [2], the electronic ID market is expected to increase by more than 50% per ann...
Claude Barral, Jean-Sébastien Coron, David ...
IEEESP
2006
130views more  IEEESP 2006»
15 years 1 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
HICSS
2007
IEEE
88views Biometrics» more  HICSS 2007»
15 years 8 months ago
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center
As a Center of Academic Excellence (CAE) in Information Assurance Education, the University of Alaska Fairbanks is committed to promoting a culture of awareness and advancement of...
Kara L. Nance, Brian Hay, Christopher Hecker
111
Voted
ICIP
2009
IEEE
16 years 2 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...