- Filter by:
-
Content Type
-
Topic
-
Handwritten Signature Verification using Instance Based Learning
For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...
Download Now -
Cyber Security and the Risk of Cyber War
Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.
Watch Now -
Encrypting Sensitive Data: What You Need to Know
Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.
Watch Now -
6.033: Computer Systems Engineering
In this webcast, the presenter focuses on topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, threads, privacy, security and encryption.
Watch Now -
Faculty Forum Online: Homeland Security
National security in an age of massive movements of people across borders is a universal concern that involves complex issues. While borders have different characteristics and challenges, there are areas of commonality. Fortunately, the overwhelming majority of crossings are not problematic, but the ones that are raise concerns.
Watch Now -
Multi-Modal User Authentication from Video for Mobile or Variable-Environment Applications
In this paper, the authors apply a combination of face and speaker identification techniques to the task of multi-modal (i.e., multi-biometric) user authentication for mobile or variable environment applications. Audio-visual data was collected using a web camera connected to a laptop computer in three different environments: a quiet indoor office,...
Download Now