Sciweavers

2399 search results - page 115 / 480
» On Authentication between Human and Computer
Sort
View
140
Voted
CHI
2011
ACM
14 years 7 months ago
Acquiring and pointing: an empirical study of pen-tilt-based interaction
Research literature has shown that pen tilt is a promising input modality in pen-based interaction. However, the human capability to control pen tilt has not been fully evaluated....
Yizhong Xin, Xiaojun Bi, Xiangshi Ren
ICIP
2007
IEEE
15 years 10 months ago
Palmprint Verification using Complex Wavelet Transform
Palmprint is a unique and reliable biometric characteristic with high usability. With the increasing demand of automatic palmprint authentication systems, the development of accur...
Lei Zhang, Zhenhua Guo, Zhou Wang, David Zhang
123
Voted
ACSAC
2006
IEEE
15 years 10 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
CCS
2005
ACM
15 years 9 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
HPCC
2005
Springer
15 years 9 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore