Sciweavers

1365 search results - page 19 / 273
» Simple authentication for the web
Sort
View
ICICS
2007
Springer
15 years 1 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
87
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
EUROMED
2010
14 years 7 months ago
A Simple Approach to Link 3D Photorealistic Models with Content of Bibliographic Repositories
Linking 3D photorealistic and virtual reality models with contents of bibliographic repositories and resources is needed for archeological and historical analyses, public understan...
Wassim Moussa, Dieter Fritsch
76
Voted
CVPR
2003
IEEE
15 years 11 months ago
Classification Based on Symmetric Maximized Minimal Distance in Subspace (SMMS)
We introduce a new classification algorithm based on the concept of Symmetric Maximized Minimal distance in Subspace (SMMS). Given the training data of authentic samples and impos...
Wende Zhang, Tsuhan Chen
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
14 years 7 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel