Sciweavers

2399 search results - page 35 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2007
ACM
15 years 10 months ago
SyncDecor: appliances for sharing mutual awareness between lovers separated by distance
Many lovers separated by distance worry about their relationships, despite the fact that the use of various means of communication such as mobile phones and email is now widesprea...
Hitomi Tsujita, Itiro Siio, Koji Tsukada
SOUPS
2010
ACM
15 years 1 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
ICIP
2005
IEEE
15 years 11 months ago
Shape contexts and Gabor features for face description and authentication
In this paper, we use a robust shape matching algorithm for stablishing correspondences between points from face images, and Gabor vectors (jets) for feature computation. After ex...
Daniel González-Jiménez, José...
HUC
2010
Springer
14 years 10 months ago
Throw your photos: an intuitive approach for sharing between mobile phones and interactive tables
Many approaches have been proposed to connect mobile phones with interactive tables. Most rely on having the phone placed on table all times, which may hinder the overall user exp...
Fadi Chehimi, Enrico Rukzio
MTA
2007
82views more  MTA 2007»
14 years 9 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli