Sciweavers

80 search results - page 5 / 16
» Authentication of fingerprint scanners
Sort
View
ICBA
2004
Springer
180views Biometrics» more  ICBA 2004»
14 years 1 months ago
FVC2004: Third Fingerprint Verification Competition
A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracki...
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jam...
ICMCS
2007
IEEE
100views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Sensor Forensics: Printers, Cameras and Scanners, They Never Lie
Forensic characterization of devices is important in many situations such as establishing the trust and verifying authenticity of data and the device that created it. Current fore...
Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chian...
ESAS
2007
Springer
13 years 11 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
RSKT
2009
Springer
14 years 2 months ago
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Abstract. In this paper, we have proposed a prototype biometrics authentication system based upon fingerprint recognition. The major functional blocks of the proposed authenticati...
Wei Xiang, Bhavin Desai, Paul Wen, Yafeng Wang, Ti...
NSPW
2003
ACM
14 years 26 days ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin