Sciweavers

2399 search results - page 25 / 480
» On Authentication between Human and Computer
Sort
View
76
Voted
CVPR
2003
IEEE
15 years 11 months ago
Classification Based on Symmetric Maximized Minimal Distance in Subspace (SMMS)
We introduce a new classification algorithm based on the concept of Symmetric Maximized Minimal distance in Subspace (SMMS). Given the training data of authentic samples and impos...
Wende Zhang, Tsuhan Chen
FLAIRS
2006
14 years 11 months ago
3D Facial Expression Recognition for the Enhancement of Human-Computer Interaction
Automatic facial expression recognition has gained much attention during the last decade because of its potential application in areas such as more engaging humancomputer interfac...
Chao Li, Armando Barreto
ACMDIS
2004
ACM
15 years 3 months ago
Between the dazzle of a new building and its eventual corpse: assembling the ubiquitous home
This paper presents the development of a lightweight component model that allows user to manage the
Tom Rodden, Andy Crabtree, Terry Hemmings, Boriana...
IJNSEC
2008
146views more  IJNSEC 2008»
14 years 9 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
SECPERU
2006
IEEE
15 years 3 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza