Sciweavers

574 search results - page 21 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
13 years 7 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 4 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
STORAGESS
2005
ACM
14 years 3 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
ICASSP
2007
IEEE
14 years 4 months ago
Adaptive Weight Estimation in Multi-Biometric Verification using Fuzzy Logic Decision Fusion
This paper describes a multi-biometric verification system that is fully adaptive to variability in data acquisition using fuzzy logic decision fusion. The system uses fuzzy logic...
Henry Pak-Sum Hui, Helen M. Meng, Man-Wai Mak
CSREASAM
2006
13 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin