Sciweavers

368 search results - page 43 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
IACR
2011
107views more  IACR 2011»
12 years 7 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...
CAIP
2009
Springer
249views Image Analysis» more  CAIP 2009»
14 years 2 months ago
Real-Time Volumetric Reconstruction and Tracking of Hands in a Desktop Environment
A probabilistic framework for vision based volumetric reconstruction and marker free tracking of hand and face volumes is presented, which exclusively relies on off-the-shelf hardw...
Christoph John, Ulrich Schwanecke, Holger Regenbre...
HICSS
2003
IEEE
62views Biometrics» more  HICSS 2003»
14 years 25 days ago
A Study on the Impacts of Verbal Interaction in Proximate GSS Sessions
Although distributed Group Support Systems (GSS) are getting popular, there are still some limitations. One of the limitations is few substitutions for face-to-face (FTF) interact...
Tsuneki Mukahi, Gail Corbitt
ISSA
2008
13 years 9 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
ARESEC
2011
117views more  ARESEC 2011»
12 years 7 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve