Sciweavers

40 search results - page 4 / 8
» Evaluation Techniques for Biometrics-Based Authentication Sy...
Sort
View
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 7 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 28 days ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
CAIP
2009
Springer
325views Image Analysis» more  CAIP 2009»
14 years 1 months ago
Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation
This paper investigates a new automated personal authentication technique using finger-knuckle-print (FKP) imaging. First, a specific data acquisition device is developed to captur...
Lin Zhang, Lei Zhang, David Zhang
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 4 months ago
Multimodal Biometric Systems - Study to Improve Accuracy and Performance
Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against ...
K. Sasidhar, Vijaya L. Kakulapati, Kolikipogu Rama...
SASN
2003
ACM
14 years 19 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi