Sciweavers

368 search results - page 53 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
SIGOPS
1998
123views more  SIGOPS 1998»
13 years 7 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
ICMI
2003
Springer
116views Biometrics» more  ICMI 2003»
14 years 22 days ago
Interactive skills using active gaze tracking
We have incorporated interactive skills into an active gaze tracking system. Our active gaze tracking system can identify an object in a cluttered scene that a person is looking a...
Rowel Atienza, Alexander Zelinsky
FGR
2008
IEEE
153views Biometrics» more  FGR 2008»
14 years 2 months ago
Facial image analysis using local feature adaptation prior to learning
Many facial image analysis methods rely on learningbased techniques such as Adaboost or SVMs to project classifiers based on the selection of local image filters (e.g., Haar and...
Rogerio Feris, Ying-li Tian, Yun Zhai, Arun Hampap...
HOTOS
2003
IEEE
14 years 24 days ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
ICPR
2006
IEEE
14 years 8 months ago
MONNET: Monitoring Pedestrians with a Network of Loosely-Coupled Cameras
MONNET is a visual surveillance system for tracking pedestrians over extended premises. The MONNET system is composed of intelligent nodes, which exchange information on the indiv...
Alexandra Branzan Albu, André Zaccarin, Den...