Sciweavers

236 search results - page 27 / 48
» Secure Biometric Authentication for Weak Computational Devic...
Sort
View
ICCSA
2007
Springer
15 years 3 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 4 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri
ICB
2007
Springer
205views Biometrics» more  ICB 2007»
15 years 3 months ago
Embedded Palmprint Recognition System on Mobile Devices
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao
IPPS
2007
IEEE
15 years 3 months ago
On the Security of Ultrasound as Out-of-band Channel
Ultrasound has been proposed as out-of-band channel for authentication of peer devices in wireless ad hoc networks. Ultrasound can implicitly contribute to secure communication ba...
Rene Mayrhofer, Hans Gellersen
82
Voted
DAC
2004
ACM
15 years 10 months ago
Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices
Digital watermarking is a process that embeds an imperceptible signature or watermark in a digital file containing audio, image, text or video data. The watermark is later used to...
Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Ni...