Sciweavers

574 search results - page 33 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
13 years 11 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
WISTP
2010
Springer
13 years 7 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
ESORICS
2011
Springer
12 years 9 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
ICPR
2008
IEEE
14 years 4 months ago
Score based biometric template selection
A biometric identification procedure usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait (e.g...
Yong Li, Jianping Yin, En Zhu, Chunfeng Hu, Hui Ch...
ETRA
2008
ACM
117views Biometrics» more  ETRA 2008»
13 years 11 months ago
Measuring the task-evoked pupillary response with a remote eye tracker
The pupil-measuring capability of video eye trackers can detect the task-evoked pupillary response: subtle changes in pupil size which indicate cognitive load. We performed severa...
Jeff Klingner, Rakshit Kumar, Pat Hanrahan