Sciweavers

632 search results - page 48 / 127
» Two Facets of Authentication
Sort
View
ICIP
2005
IEEE
14 years 10 months ago
Shape contexts and Gabor features for face description and authentication
In this paper, we use a robust shape matching algorithm for stablishing correspondences between points from face images, and Gabor vectors (jets) for feature computation. After ex...
Daniel González-Jiménez, José...
ICPR
2000
IEEE
14 years 10 months ago
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 3 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
AVBPA
2005
Springer
460views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Fingerprint Quality Indices for Predicting Authentication Performance
The performance of an automatic fingerprint authentication system relies heavily on the quality of the captured fingerprint images. In this paper, two new quality indices for fi...
Yi Chen, Sarat C. Dass, Anil K. Jain
CCS
2010
ACM
13 years 9 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz