Sciweavers

105 search results - page 10 / 21
» Robust Authentication Using Physically Unclonable Functions
Sort
View
HUC
2007
Springer
15 years 3 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...
JEI
2008
135views more  JEI 2008»
14 years 11 months ago
Face authentication using a hybrid approach
This paper presents a hybrid approach to face-feature extraction based on the trace transform and the novel kernel partial-least-squares discriminant analysis (KPA). The hybrid app...
Vitomir Struc, France Mihelic, Nikola Pavesic
109
Voted
TII
2010
146views Education» more  TII 2010»
14 years 6 months ago
A Flexible Design Flow for Software IP Binding in FPGA
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, develop...
Michael A. Gora, Abhranil Maiti, Patrick Schaumont
MICCAI
2005
Springer
16 years 15 days ago
A Physical Model for DT-MRI Based Connectivity Map Computation
In this study we address the problem of extracting a robust connectivity metric for brain white matter. We defined the connectivity problem as an energy minimization task, by assoc...
Burak Acar, Erdem Yörük, Roland Bammer
103
Voted
HOST
2008
IEEE
15 years 6 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach