Sciweavers

203 search results - page 4 / 41
» A Fuzzy Vault Scheme
Sort
View
IBMRD
2007
47views more  IBMRD 2007»
13 years 8 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
BIOSIG
2009
75views Biometrics» more  BIOSIG 2009»
13 years 9 months ago
Multi-Sample Fusion with Template Protection
: The widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, f...
Emile Kelkboom, Jeroen Breebaart, Raymond N. J. Ve...
PRL
2007
115views more  PRL 2007»
13 years 8 months ago
A decomposition scheme for 3D fuzzy objects based on fuzzy distance information
A decomposition scheme for 3D fuzzy objects is presented. The decomposition is guided by a fuzzy distance transform (FDT) of the fuzzy object and aims to decompose the fuzzy objec...
Stina Svensson
EUROCRYPT
2005
Springer
14 years 1 months ago
Fuzzy Identity-Based Encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. ...
Amit Sahai, Brent Waters
EUSFLAT
2001
13 years 9 months ago
Thermal comfort control based on fuzzy decision making
The paper describes a fuzzy decisionmalung approach to controlling thermal comfort in the occupied zones of an airconditioned building. The control objective is defined in terms o...
Richard Thompson, Arthur L. Dexter