Sciweavers

368 search results - page 48 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
JOC
2006
116views more  JOC 2006»
13 years 7 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
FGR
2006
IEEE
284views Biometrics» more  FGR 2006»
14 years 1 months ago
A 3D Facial Expression Database For Facial Behavior Research
Traditionally, human facial expressions have been studied using either 2D static images or 2D video sequences. The 2D-based analysis is incapable of handing large pose variations....
Lijun Yin, Xiaozhou Wei, Yi Sun, Jun Wang, Matthew...
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 1 months ago
Decision Support in Health Care via Root Evidence Sampling
— Bayesian networks play a key role in decision support within health care. Physicians rely on Bayesian networks to give medical treatment, generate what-if scenarios, and other ...
Benjamin B. Perry, Eli Faulkner
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
14 years 1 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
CORR
2008
Springer
126views Education» more  CORR 2008»
13 years 7 months ago
3D Building Model Fitting Using A New Kinetic Framework
We describe a new approach to fit the polyhedron describing a 3D building model to the point cloud of a Digital Elevation Model (DEM). We introduce a new kinetic framework that hi...
Mathieu Brédif, Didier Boldo, Marc Pierrot ...