Simple Authentication Scheme for Personal Digital Assistants using the Hidden Markov Model ToolKit
Personal Digital Assistants (PDA) are becoming increasingly important as a business tool. A modern day PDA is loaded with various business application ranging from office related software (word processors, spreadsheets & presentation software), personal information manager (organizers, contact i...
| Main Authors: | Ching, Ho Chiung, Eswaran, Chikkannan |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3211/ |
Similar Items
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
English digits speech recognition system based on hidden Markov Models
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Hand gesture recognition using hidden markov models: a review on techniques and approaches
by: Mohd. Salleh, Noor Saliza, et al.
Published: (2006)
by: Mohd. Salleh, Noor Saliza, et al.
Published: (2006)
English digits speech recognition system based on Hidden Markov Models
by: Abushariah, Ahmad A. M., et al.
Published: (2010)
by: Abushariah, Ahmad A. M., et al.
Published: (2010)
Offline handwriting recognition using Artificial Neural Network and Hidden Markov Model
by: Tay, Yong Haur
Published: (2002)
by: Tay, Yong Haur
Published: (2002)
Hidden Markov models: an insight
by: Mohd Yusoff, Mohd Izhan, et al.
Published: (2014)
by: Mohd Yusoff, Mohd Izhan, et al.
Published: (2014)
The integration of simple Markov model in solving single line production system
by: Hasan Basari, Abd Samad, et al.
Published: (2011)
by: Hasan Basari, Abd Samad, et al.
Published: (2011)
Modeling of the biliary tree structure in MRCP images
by: Logeswaran, , Rajasvaran, et al.
Published: (2005)
by: Logeswaran, , Rajasvaran, et al.
Published: (2005)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Speaker recognition based on Hidden Markov Model
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
Topic transition detection using hierarchical hidden Markov and semi-Markov models
by: Phung, Dinh, et al.
Published: (2005)
by: Phung, Dinh, et al.
Published: (2005)
Disease surveillance using a hidden Markov model
by: Watkins, Rochelle, et al.
Published: (2009)
by: Watkins, Rochelle, et al.
Published: (2009)
Approximate Entropy-Based Epileptic EEG Detection Using Artificial Neural Networks
by: Srinivasan, Vairavan, et al.
Published: (2007)
by: Srinivasan, Vairavan, et al.
Published: (2007)
Revealing Distinct Neural Signatures in Magnetoencephalography with Hidden Markov Models
by: Seedat, Zelekha Abid
Published: (2022)
by: Seedat, Zelekha Abid
Published: (2022)
Short review on metamorphic malware detection in Hidden Markov Models
by: Yeong, T. Ling, et al.
Published: (2017)
by: Yeong, T. Ling, et al.
Published: (2017)
Speech Signal Endpoint Detection Using Hidden Markov Models
by: Ahmed, M. Masroor, et al.
Published: (2006)
by: Ahmed, M. Masroor, et al.
Published: (2006)
An efficient bilateral remote user authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
Enhance Cloudlet Scheduling Policy (ECSP) using cloudsim toolkit with resubmission fault tolerance mechanism
by: Auzir, Juliza
Published: (2018)
by: Auzir, Juliza
Published: (2018)
The PROSPER Toolkit
by: Dennis, Louise Abigail, et al.
Published: (2000)
by: Dennis, Louise Abigail, et al.
Published: (2000)
Communications Toolkit
by: Grellier, Jane, et al.
Published: (2018)
by: Grellier, Jane, et al.
Published: (2018)
Word classification for sign language synthesizer using hidden Markov model
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
Forward-Backward smoothing for hidden markov models of point pattern data
by: Dam, N., et al.
Published: (2018)
by: Dam, N., et al.
Published: (2018)
Efficient duration modelling in the hierarchical hidden semi-Markov models and their applications
by: Duong, Thi V. T.
Published: (2008)
by: Duong, Thi V. T.
Published: (2008)
Activity recognition and abnormality detection with the switching hidden semi-Markov model
by: Duong, Thi, et al.
Published: (2005)
by: Duong, Thi, et al.
Published: (2005)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Enhanced parallel thread scheduling for Java based applications on multi-core architecture
by: Kam-Mun, Chong, et al.
Published: (2008)
by: Kam-Mun, Chong, et al.
Published: (2008)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Webcam Based Fingerprint Authentication for Personal Identification System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
The personal library and indexing management information system (PLIMIS) / Choong Wai Kit
by: Choong, Wai Kit
Published: (2001)
by: Choong, Wai Kit
Published: (2001)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
An Adaptive Error Modeling Scheme for the Lossless Compression of EEG Signals
by: Sriraam, N., et al.
Published: (2008)
by: Sriraam, N., et al.
Published: (2008)
A Dynamic Hidden Markov Random Field Model for Foreground and Shadow Segmentation
by: Wang, Y., et al.
Published: (2005)
by: Wang, Y., et al.
Published: (2005)
Extracting features for the linguistic variables of fuzzy rules using hidden Markov model
by: Suliman, Azizah, et al.
Published: (2007)
by: Suliman, Azizah, et al.
Published: (2007)
Hidden markov model for decision making among heterogeneous systems in intelligent building
by: Abba, Babakura
Published: (2014)
by: Abba, Babakura
Published: (2014)
Similar Items
-
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008) -
English digits speech recognition system based on hidden Markov Models
by: Gunawan, Teddy Surya, et al.
Published: (2011) -
Hand gesture recognition using hidden markov models: a review on techniques and approaches
by: Mohd. Salleh, Noor Saliza, et al.
Published: (2006) -
English digits speech recognition system based on Hidden Markov Models
by: Abushariah, Ahmad A. M., et al.
Published: (2010) -
Offline handwriting recognition using Artificial Neural Network and Hidden Markov Model
by: Tay, Yong Haur
Published: (2002)