Sciweavers

368 search results - page 32 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
PERVASIVE
2007
Springer
14 years 1 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
FOCS
2006
IEEE
14 years 1 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
ICIP
2004
IEEE
14 years 9 months ago
Facial similarity across age disguise illumination and pose
Illumination, pose variations, disguises, aging effects and expression variations are some of the key factors that affect the performance of face recognition systems. Face recogni...
Narayanan Ramanathan, Rama Chellappa, Amit K. Roy ...
JOC
2007
129views more  JOC 2007»
13 years 7 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
ICIAP
2005
ACM
14 years 7 months ago
Asymmetric 3D/2D Processing: A Novel Approach for Face Recognition
Facial image analysis is very useful in many applications such as video compression, talking heads, or biometrics. During the last few years, many algorithms have been proposed in ...
Daniel Riccio, Jean-Luc Dugelay