We develop an efficient algorithm for detecting frequent patterns that occur in sequence databases under certain constraints. By combining the use of bit vector representations of ...
: While the use of Federated Identity Management and Single Sign-On based on the Security Assertion Markup Language (SAML) standards becomes more and more important, there are quit...
: Following regulations of the EU Council in 2004, the member states have deployed electronic passports according to ICAO standards. Such documents contain an embedded radio freque...
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
: This paper gives performance-based results for the application of a leading recognition algorithm applied to standardized iris imagery. The implementation was evaluated in NIST...
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Abstract: This article describes different skin diseases which could have the influence to the process of fingerprint acquirement. There are many people, who suffer under such dise...