Sciweavers

1365 search results - page 27 / 273
» Simple authentication for the web
Sort
View
ICVGIP
2008
14 years 11 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi
ESWS
2007
Springer
15 years 3 months ago
Simple Algorithms for Predicate Suggestions Using Similarity and Co-occurrence
Abstract When creating Semantic Web data, users have to make a critical choice for a vocabulary: only through shared vocabularies can meaning be established. A centralised policy p...
Eyal Oren, Sebastian Gerke, Stefan Decker
72
Voted
ICPR
2006
IEEE
15 years 3 months ago
Combining Fingerprint, Palmprint and Hand-Shape for User Authentication
This paper investigates a new approach for personal authentication by combining unique biometric features which can be acquired from hand images alone. The proposed method attempt...
Ajay Kumar, David Zhang
CSMR
2010
IEEE
14 years 4 months ago
ROMULUS: Domain Driven Design and Mashup Oriented Development Based on Open Source Java Metaframework for Pragmatic, Reliable an
Web software development is one of the most active areas and fastest growing industries in software and services development in Europe, and, in particular, Java Enterprise Edition ...
Boni García, Juan C. Dueñas, Jos&eac...
87
Voted
PERCOM
2007
ACM
15 years 9 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...