This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. W...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
In this paper, we present a face authentication system that can be broken down in three stages. Prior to feature extraction, a pose correction step is applied, so that frontal fac...
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Recently, Lee, Ryu and Yoo proposed a fingerprint-based remote user authentication scheme by using smart cards and biometrics. Their scheme is based on two tiers of ElGamal's...