Sciweavers

1656 search results - page 161 / 332
» Secure Computation Without Authentication
Sort
View
ICPR
2010
IEEE
14 years 1 months ago
Video Based Palmprint Recognition
The ability to carry out biometric authentication using generic cameras can be extremely useful for a variety of applications, especially in mobile devices. Palmprint based authen...
Chhaya Methani, Anoop Namboodiri
GD
2008
Springer
13 years 11 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
MMSEC
2006
ACM
213views Multimedia» more  MMSEC 2006»
14 years 4 months ago
Parameter optimization for biometric fingerprint recognition using genetic algorithms
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. Our application was planned so that it can be used without great effort...
Tobias Scheidat, Andreas Engel, Claus Vielhauer
EUROCRYPT
2007
Springer
14 years 4 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz
SDM
2007
SIAM
190views Data Mining» more  SDM 2007»
13 years 11 months ago
AC-Framework for Privacy-Preserving Collaboration
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. Increasing security concerns have led to a surge in w...
Wei Jiang, Chris Clifton