Sciweavers

236 search results - page 5 / 48
» Secure Biometric Authentication for Weak Computational Devic...
Sort
View
EUROCRYPT
2005
Springer
14 years 1 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
CVPR
2007
IEEE
14 years 1 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 1 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi
CSREASAM
2006
13 years 9 months ago
A Proposal of One-Time Biometric Authentication
- In biometric authentication, feature information of each enrolled person's biometric information is enrolled as templates. Secure databases or anti-tampered devices store th...
Yoshifumi Ueshige, Kouichi Sakurai
PERCOM
2006
ACM
14 years 7 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...