Sciweavers

40 search results - page 1 / 8
» Evaluation Techniques for Biometrics-Based Authentication Sy...
Sort
View
ICPR
2000
IEEE
14 years 4 months ago
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)
Biometrics-based authentication is becoming popular because of increasing ease-of-use and reliability. Performance evaluation of such systems is an important issue. We attempt to ...
Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha
DICTA
2007
13 years 5 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
ACISP
2005
Springer
13 years 9 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
PAMI
2007
97views more  PAMI 2007»
13 years 3 months ago
Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. The current paper introduces a novel statistical me...
Sinjini Mitra, Marios Savvides, Anthony Brockwell
INFOCOM
2008
IEEE
13 years 10 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang