Sciweavers

33 search results - page 2 / 7
» IC Activation and User Authentication for Security-Sensitive...
Sort
View
97
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Continuous pilot based adaptive estimation for IDMA systems on underwater acoustic channels
Two adaptive receivers for jointly detecting active users in an interleave division multiple access (IDMA) system are considered for highly dispersive underwater acoustic channels...
Salah Aliesawi, Charalampos C. Tsimenidis, Bayan S...
90
Voted
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
76
Voted
BIOSIG
2003
140views Biometrics» more  BIOSIG 2003»
14 years 11 months ago
Multifactor Biometric Sketch Authentication
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...
Arslan Brömme, Stephan Al-Zubi
111
Voted
CASES
2008
ACM
15 years 6 days ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
84
Voted
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 3 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...