Sciweavers

574 search results - page 27 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
PR
2008
137views more  PR 2008»
13 years 9 months ago
Cancellable biometrics and annotations on BioHash
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges ...
Andrew Beng Jin Teoh, Yip Wai Kuan, Sangyoun Lee
SP
2009
IEEE
14 years 4 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 4 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
ICB
2007
Springer
184views Biometrics» more  ICB 2007»
14 years 4 months ago
Biometric Template Classification: A Case Study in Iris Textures
Most of the biometric authentication systems store multiple templates per user to account for variations in biometric data. Therefore, these systems suffer from storage space and ...
Edara Srinivasa Reddy, Chinnam SubbaRao, Inampudi ...
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
14 years 1 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...