Sciweavers

1573 search results - page 83 / 315
» Strong User Authentication
Sort
View
AINA
2007
IEEE
15 years 4 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Efficient Recognition of Authentic Dynamic Facial Expressions on the Feedtum Database
In order to allow for fast recognition of a user’s affective state we discuss innovative holistic and self organizing approaches for efficient facial expression analysis. The f...
Frank Wallhoff, Björn Schuller, Michael Hawel...
POLICY
2007
Springer
15 years 4 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
DIAU
2000
Springer
15 years 2 months ago
Web MIXes: A System for Anonymous and Unobservable Internet Access
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as ...
Oliver Berthold, Hannes Federrath, Stefan Köp...
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
15 years 1 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy