Sciweavers

551 search results - page 8 / 111
» Preventing existence
Sort
View
ICISS
2007
Springer
15 years 1 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
ICASSP
2010
IEEE
14 years 8 months ago
Sectored Random Projections for Cancelable Iris Biometrics
Privacy and security are essential requirements in practical biometric systems. In order to prevent the theft of biometric patterns, it is desired to modify them through revocable...
Jaishanker K. Pillai, Vishal M. Patel, Rama Chella...
85
Voted
ESWS
2006
Springer
15 years 1 months ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
WETICE
2005
IEEE
15 years 3 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
3DIM
2003
IEEE
15 years 2 months ago
Colour Texture Fusion of Multiple Range Images
Texture mapping of manifolds that were reconstructed from different range views requires the fusion of the texture maps acquired from different views. Illumination conditions and ...
Alexander Agathos, Robert B. Fisher