Sciweavers

368 search results - page 18 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
FGR
2008
IEEE
288views Biometrics» more  FGR 2008»
14 years 2 months ago
Face recognition with temporal invariance: A 3D aging model
The variation caused by aging has not received adequate attention compared with pose, lighting, and expression variations. Aging is a complex process that affects both the 3D shap...
Unsang Park, Yiying Tong, Anil K. Jain
WISEC
2010
ACM
14 years 14 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
FOCS
2002
IEEE
14 years 18 days ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
FGR
2008
IEEE
254views Biometrics» more  FGR 2008»
13 years 8 months ago
Design sparse features for age estimation using hierarchical face model
A key point in automatic age estimation is to design feature set essential to age perception. To achieve this goal, this paper builds up a hierarchical graphical face model for fa...
Jin-Li Suo, Tianfu Wu, Song Chun Zhu, Shiguang Sha...
EUROCRYPT
2004
Springer
14 years 1 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels