Sciweavers

1573 search results - page 105 / 315
» Strong User Authentication
Sort
View
ICPR
2002
IEEE
15 years 11 months ago
Hiding a Face in a Fingerprint Image
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. We present...
Anil K. Jain, Umut Uludag, Rein-Lien Hsu
CHI
2010
ACM
15 years 4 months ago
Usability and strength in click-based graphical passwords
Click-based graphical passwords have attractive usability properties, such as cueing and good memorability. However, image size and number of click-points in each password signifi...
Elizabeth Stobert
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
15 years 4 months ago
Harmonizing service and network provisioning for federative access in a mobile environment
—In this paper we propose an integrated platform to power the symbiosis between networks and services whilst supporting mobility of users. This platform is based on methods for a...
David J. Lutz, Patrick Mandic, Sascha Neinert, Rut...
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 4 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...