Sciweavers

118 search results - page 1 / 24
» Efficient fingerprint-based user authentication for embedded...
Sort
View
89
Voted
DAC
2005
ACM
16 years 2 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
106
Voted
ICIP
2006
IEEE
16 years 2 months ago
Fingerprint Indexing Based on LAS Registration
Fingerprint indexing is an efficient technique that greatly improves the performance of fingerprint based person authentication systems by reducing the number of comparison. In th...
Tong Liu, Chao Zhang, Pengwei Hao
104
Voted
WOA
2003
15 years 2 months ago
Agents Ownership Setting by User Fingerprints
— Agent ownership is a difficult task that touches legal domain. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent’s act...
Salvatore Vitabile, Giovanni Pilato, Vincenzo Cont...
119
Voted
CASES
2010
ACM
14 years 11 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
112
Voted
IACR
2011
137views more  IACR 2011»
14 years 23 days ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...