Abstract: Biometric authentication is often considered to enhance identity verification. The use of biometrics also introduces new challenges to protect the privacy of the subjects...
Jeroen Breebaart, Christoph Busch, Justine Grave, ...
Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
The Scholarly Link Specification (S-Link-S) Framework has been proposed as a possible approach towards a solution to the reference linking problem. S-Link-S provides a language ...
A smart card based face verification system is proposed in which the feature extraction and decision making is performed on the card. Such an architecture has many privacy and sec...
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...