Sciweavers

4413 search results - page 44 / 883
» Security for biometric data
Sort
View
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
14 years 4 months ago
GrayWulf: Scalable Clustered Architecture for Data Intensive Computing
Alexander S. Szalay, Gordon Bell, Jan vandenBerg, ...
AUTOID
2005
IEEE
14 years 3 months ago
A Fast Algorithm for ICP-Based 3D Shape Biometrics
In a biometrics scenario, gallery images are enrolled into the database ahead of the matching step, which gives us the opportunity to build related data structures before the prob...
Ping Yan, Kevin W. Bowyer
ACHI
2008
IEEE
14 years 4 months ago
Face Authentication for Banking
—This paper analyzes the benefit and the limitations of using a particular biometric technology “namely face authentication” for banking applications. We present first the ge...
Baptiste Hemery, Julien Mahier, Marc Pasquet, Chri...
ICPR
2006
IEEE
14 years 4 months ago
A fusion methodology based on Dempster-Shafer evidence theory for two biometric applications
Different features carry more or less rich and varied pieces of information to characterize a pattern. The fusion of these different sources of information can provide an opportun...
Muhammad Arif, Thierry Brouard, Nicole Vincent
IJNSEC
2008
209views more  IJNSEC 2008»
13 years 10 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...