Sciweavers

FEGC
2009
86views Biometrics» more  FEGC 2009»
13 years 4 months ago
Binary Sequences and Association Graphs for Fast Detection of Sequential Patterns
We develop an efficient algorithm for detecting frequent patterns that occur in sequence databases under certain constraints. By combining the use of bit vector representations of ...
Selim Mimaroglu, Dan A. Simovici
BIOSIG
2009
102views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
SAMLizing the European Citizen Card
: While the use of Federated Identity Management and Single Sign-On based on the Security Assertion Markup Language (SAML) standards becomes more and more important, there are quit...
Jan Eichholz, Detlef Hühnlein, Jörg Schw...
BIOSIG
2009
104views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
A Note on the Protection Level of Biometric Data in Electronic Passports
: Following regulations of the EU Council in 2004, the member states have deployed electronic passports according to ICAO standards. Such documents contain an embedded radio freque...
Harald Baier, Tobias Straub
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
BIOSIG
2009
106views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
Quantitative Standardization of Iris Image Formats
: This paper gives performance-based results for the application of a leading recognition algorithm applied to standardized iris imagery. The implementation was evaluated in NIST&#...
Patrick Grother
BIOSIG
2009
169views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
Reverse Public Key Encryption
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
David Naccache, Rainer Steinwandt, Moti Yung
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
BIOSIG
2009
177views Biometrics» more  BIOSIG 2009»
13 years 4 months ago
Classification of Skin Diseases and Their Impact on Fingerprint Recognition
Abstract: This article describes different skin diseases which could have the influence to the process of fingerprint acquirement. There are many people, who suffer under such dise...
Martin Drahanský, Eva Brezinova, Filip Ors&...