Sciweavers

485 search results - page 35 / 97
» Authentication by Biometric Verification
Sort
View
ESAS
2007
Springer
14 years 12 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ICB
2007
Springer
121views Biometrics» more  ICB 2007»
14 years 11 days ago
Optimal Decision Fusion for a Face Verification System
Fusion is a popular practice to increase the reliability of the biometric verification. In this paper, optimal fusion at decision level by AND rule and OR rule is investigated. Bot...
Qian Tao, Raymond N. J. Veldhuis
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
14 years 2 months ago
Bayesian Hill-Climbing Attack and Its Application to Signature Verification
Javier Galbally, Julian Fiérrez-Aguilar, Ja...
AVBPA
2003
Springer
80views Biometrics» more  AVBPA 2003»
14 years 1 months ago
Cluster-Dependent Feature Transformation for Telephone-Based Speaker Verification
Chi-Leung Tsang, Man-Wai Mak, Sun-Yuan Kung
IVC
2006
89views more  IVC 2006»
13 years 8 months ago
Hand biometrics
The potential of hand shape and hand texture-based biometry is investigated and algorithms are developed. Feature extraction stage is preceded by meticulous registration of the de...
Erdem Yörük, Helin Dutagaci, Bülent...