A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracki...
Forensic characterization of devices is important in many situations such as establishing the trust and verifying authenticity of data and the device that created it. Current fore...
Nitin Khanna, Aravind K. Mikkilineni, Pei-Ju Chian...
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Abstract. In this paper, we have proposed a prototype biometrics authentication system based upon fingerprint recognition. The major functional blocks of the proposed authenticati...
Wei Xiang, Bhavin Desai, Paul Wen, Yafeng Wang, Ti...
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...