Sciweavers

32 search results - page 4 / 7
» A Matching Algorithm Secure against the Wolf Attack in Biome...
Sort
View
DAC
2005
ACM
14 years 8 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
ICASSP
2008
IEEE
14 years 1 months ago
Dynamic signature verification with template protection using helper data
A biometric template protection system for dynamic signature veri cation is presented. The approach uses auxiliary (helper) data that allows the matching with secure templates but...
Manuel R. Freire, Julian Fiérrez, Javier Or...
ECCV
2004
Springer
14 years 24 days ago
Biometric Sensor Interoperability: A Case Study in Fingerprints
The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...
Arun Ross, Anil K. Jain
ICASSP
2011
IEEE
12 years 11 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt