Sciweavers

632 search results - page 70 / 127
» Two Facets of Authentication
Sort
View
ICB
2007
Springer
184views Biometrics» more  ICB 2007»
14 years 3 months ago
Biometric Template Classification: A Case Study in Iris Textures
Most of the biometric authentication systems store multiple templates per user to account for variations in biometric data. Therefore, these systems suffer from storage space and ...
Edara Srinivasa Reddy, Chinnam SubbaRao, Inampudi ...
PR
2006
119views more  PR 2006»
13 years 8 months ago
Fingerprint matching by genetic algorithms
Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger. In this p...
Xuejun Tan, Bir Bhanu
ESAS
2007
Springer
14 years 3 months ago
Private Handshakes
—Nowadays, users are increasingly concerned about individual privacy in cyberspace and Internet. In this paper, we propose the concept of private handshakes with optional account...
Jaap-Henk Hoepman
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
14 years 3 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin