Sciweavers

1050 search results - page 53 / 210
» Two methods of authenticated positioning
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 3 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
MVA
2000
139views Computer Vision» more  MVA 2000»
15 years 1 months ago
Automatic Intruder Detection and Tracking System with Pan-Tilt-Zoom Camera
We propose an automatic monitoring system which detects and tracks intruders, using a pan-tiltzoom camera. Detection is based on a background subtraction method which detects the ...
Tetsuji Haga, Hideto Fujiwara, Kazuhiko Sumi
PAMI
2007
133views more  PAMI 2007»
14 years 11 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
TSMC
2008
98views more  TSMC 2008»
14 years 11 months ago
A New Active Visual System for Humanoid Robots
In this paper, a new active visual system is developed, which is based on bionic vision and is insensitive to the property of the cameras. The system consists of a mechanical platf...
De Xu, Youfu Li, Min Tan, Yang Shen
CCS
2004
ACM
15 years 5 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno