Sciweavers

1150 search results - page 130 / 230
» Beacon Based Authentication
Sort
View
EUC
2008
Springer
13 years 10 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ICIP
2001
IEEE
14 years 10 months ago
A face and gesture recognition system based on an active stereo sensor
The paper presents several novel 3D image analysis algorithms, applied towards the segmentation and modeling of faces and hands. These are subsequently used to build a face-based ...
Sotiris Malassiotis, Filareti Tsalakanidou, Nikola...
ICPR
2008
IEEE
14 years 10 months ago
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics
Cancelable biometric systems are gaining in popularity for use in person authentication for applications where the privacy and security of biometric templates are important consid...
Achint Oommen Thomas, Nalini K. Ratha, Jonathan H....
WETICE
2009
IEEE
14 years 3 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
ICASSP
2007
IEEE
14 years 3 months ago
The Biosecure Geometry-Based System for Hand Modality
We present an identification and authentication system based on hand modality which is part of a reference system for all modalities developed within the Biosecure consortium. It...
Geoffroy Fouquier, Laurence Likforman-Sulem, J&eac...