Sciweavers

385 search results - page 47 / 77
» Advances in smart cards
Sort
View
AVBPA
2003
Springer
148views Biometrics» more  AVBPA 2003»
13 years 11 months ago
Scalability Analysis of Audio-Visual Person Identity Verification
In this work, we present a multimodal identity verification system based on the fusion of the face image and the text independent speech data of a person. The system conciliates th...
Jacek Czyz, Samy Bengio, Christine Marcel, Luc Van...
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
13 years 11 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...
FC
2000
Springer
83views Cryptology» more  FC 2000»
13 years 11 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
13 years 9 months ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...
DAGSTUHL
2007
13 years 9 months ago
CodeVoting: protecting against malicious vote manipulation at the voter's PC
Voting in uncontrolled environments, such as the Internet comes with a price, the price of having to trust in uncontrolled machines the collection of voter’s vote. An uncontrolle...
Rui Joaquim, Carlos Ribeiro