Sciweavers

24529 search results - page 464 / 4906
» Computing on Authenticated Data
Sort
View
USITS
1997
15 years 6 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
141
Voted
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
15 years 5 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
PAMI
2007
133views more  PAMI 2007»
15 years 4 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 2 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
SI3D
2005
ACM
15 years 10 months ago
A camera-based interface for interaction with mobile handheld computers
Recent advances in mobile computing allow the users to deal with 3D interactive graphics on handheld computers. Although the computing resources and screen resolutions grow steadi...
Martin Hachet, Joachim Pouderoux, Pascal Guitton