Sciweavers

368 search results - page 14 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
PET
2009
Springer
14 years 2 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
AMFG
2007
IEEE
327views Biometrics» more  AMFG 2007»
14 years 2 months ago
Model-Assisted 3D Face Reconstruction from Video
Abstract. This paper describes a model-assisted system for reconstruction of 3D faces from a single consumer quality camera using a structure from motion approach. Typical multi-vi...
Douglas Fidaleo, Gérard G. Medioni
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 1 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
ISVC
2005
Springer
14 years 1 months ago
Investigating the Impact of Face Categorization on Recognition Performance
Face recognition is a key biometric technology with a wide range of potential applications both in government and private sectors. Despite considerable progress in face recognition...
Konstantinos Veropoulos, George Bebis, Michael A. ...