Sciweavers

2600 search results - page 490 / 520
» E-Voting and Biometric Systems
Sort
View
USS
2010
14 years 11 months ago
Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion a...
Payas Gupta, Debin Gao
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
15 years 8 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
15 years 8 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
HICSS
2010
IEEE
225views Biometrics» more  HICSS 2010»
15 years 8 months ago
A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian Secto
Communities of practice (COPs) have been around since the founding of the first social networks many millennia ago. Organizations around the world over the last two decades have l...
Jon Brickey, Steven Walczak
FGR
2008
IEEE
219views Biometrics» more  FGR 2008»
15 years 8 months ago
2D-3D face matching using CCA
In recent years, 3D face recognition has obtained much attention. Using 2D face image as probe and 3D face data as gallery is an alternative method to deal with computation comple...
Weilong Yang, Dong Yi, Zhen Lei, Jitao Sang, Stan ...