Sciweavers

4413 search results - page 46 / 883
» Security for biometric data
Sort
View
ICIP
2009
IEEE
14 years 11 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
TIFS
2008
129views more  TIFS 2008»
13 years 9 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
COMPSEC
2004
131views more  COMPSEC 2004»
13 years 9 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 3 months ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
HICSS
2000
IEEE
160views Biometrics» more  HICSS 2000»
14 years 2 months ago
Analysis of Coordinated Multilateral Trades
A new operating paradigm is still needed for the power industry in order to achieve a workable deregulated market. The two main proposals, namely the Bilateral and the Poolco mode...
Pierre-François D. Quet, Jose B. Cruz Jr., ...