Sciweavers

485 search results - page 85 / 97
» Authentication by Biometric Verification
Sort
View
APLAS
2010
ACM
13 years 7 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
BIOSIG
2007
170views Biometrics» more  BIOSIG 2007»
13 years 8 months ago
Privacy enhancing technology for a 3D-face recognition system
: 2D Face images are traditionally used in civil governmental applications. An extension from 2D to 3D images will lead to several advantages when setting up automated authenticati...
Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, ...
IICAI
2007
13 years 8 months ago
Modeling Temporal Behavior via Structured Hidden Markov Models: an Application to Keystroking Dynamics
Structured Hidden Markov Models (S-HMM) are a variant of Hierarchical Hidden Markov Models; it provides an abstraction mechanism allowing a high level symbolic description of the k...
Ugo Galassi, Attilio Giordana, Charbel Julien, Lor...
CORR
2010
Springer
244views Education» more  CORR 2010»
13 years 7 months ago
Fingerprint Recognition Using Minutia Score Matching
: The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprin...
J. Ravi, K. B. Raja, K. R. Venugopal
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
14 years 20 days ago
Developing Analytic, Cognitive and Linguistic Skills with an Electronic Negotiation System
An increasing number of Web-based systems, including brainstorming, decision-making, and negotiation support systems, are being developed to aid users in solving particular types ...
Margaret J. Kersten, Marlene Haley, Gregory E. Ker...