Sciweavers

4413 search results - page 25 / 883
» Security for biometric data
Sort
View
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
14 years 2 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
ICPR
2006
IEEE
14 years 11 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 2 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
BIOSIG
2003
89views Biometrics» more  BIOSIG 2003»
13 years 11 months ago
How to Test the Performance of Speech Verifiers and Statistical Evaluation
Abstract: Biometric identification and verification technologies, in the past, have promised high performance levels. Such performance statements lead to the assumption, that these...
Jörg Tacke, Andreas Wolf
IVIC
2009
Springer
14 years 4 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...