Sciweavers

5 search results - page 1 / 1
» On the Applicability of Off-Line Signatures to the Fuzzy Vau...
Sort
View
ICDAR
2007
IEEE
13 years 12 months ago
On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction
In the present contribution, the applicability of off-line handwritten signatures to the fuzzy vault construction is studied. Feature extraction is based on quantized maxima and m...
Manuel R. Freire, Julian Fiérrez-Aguilar, M...
CTRSA
2009
Springer
112views Cryptology» more  CTRSA 2009»
13 years 9 months ago
Divisible On-Line/Off-Line Signatures
On-line/Off-line signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented. The idea is to split the signing pro...
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming...
GLOBECOM
2009
IEEE
14 years 10 days ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
13 years 11 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ICAIL
2007
ACM
13 years 9 months ago
Essential deduplication functions for transactional databases in law firms
As massive document repositories and knowledge management systems continue to expand, in proprietary environments as well as on the Web, the need for duplicate detection becomes i...
Jack G. Conrad, Edward L. Raymond