Sciweavers

23 search results - page 4 / 5
» Biometric template transformation: a security analysis
Sort
View
PRL
2007
180views more  PRL 2007»
13 years 5 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 3 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
ICPR
2006
IEEE
14 years 7 months ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar
FC
2005
Springer
110views Cryptology» more  FC 2005»
13 years 11 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 24 days ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...