Sciweavers

335 search results - page 3 / 67
» Biometrics and Security
Sort
View
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
13 years 11 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
13 years 12 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
13 years 7 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
13 years 10 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt