Sciweavers

368 search results - page 13 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 11 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
IANDC
2007
151views more  IANDC 2007»
13 years 7 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
13 years 4 months ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu
ICPR
2006
IEEE
14 years 8 months ago
Recognizing Rotated Faces from Two Orthogonal Views in Mugshot Databases
Tolerance to pose variations is one of the key remaining problems in face recognition. It is of great interest in airport surveillance systems using mugshot databases to screen tr...
Xiaozheng Zhang, Yongsheng Gao, Bailing Zhang
ICPR
2006
IEEE
14 years 8 months ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar