Sciweavers

24 search results - page 4 / 5
» Application-Specific Key Release Scheme from Biometrics
Sort
View
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
13 years 10 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
ITCC
2005
IEEE
14 years 29 days ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
ICB
2009
Springer
194views Biometrics» more  ICB 2009»
14 years 1 months ago
FM Model Based Fingerprint Reconstruction from Minutiae Template
Minutiae-based representation is the most widely adopted fingerprint representation scheme. The compactness of minutiae template has created an impression that the minutiae templa...
Jianjiang Feng, Anil K. Jain
TIT
2011
125views more  TIT 2011»
13 years 2 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
AMFG
2005
IEEE
155views Biometrics» more  AMFG 2005»
14 years 1 months ago
Linear Programming for Matching in Human Body Gesture Recognition
We present a novel human body gesture recognition method using a linear programming based matching scheme. Instead of attempting to segment an object from the background, we develo...
Hao Jiang, Ze-Nian Li, Mark S. Drew