Sciweavers

5 search results - page 1 / 1
» Order and entropy in picture passwords
Sort
View
GRAPHICSINTERFACE
2008
13 years 6 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings
FGCS
2000
104views more  FGCS 2000»
13 years 4 months ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
SG
2010
Springer
13 years 10 months ago
Automatic Blending of Multiple Perspective Views for Aesthetic Composition
Hand-drawn pictures differ from ordinary perspective images in that the entire scene is composed of local feature regions each of which is projected individually as seen from its ...
Kairi Mashio, Kenichi Yoshida, Shigeo Takahashi, M...
DICTA
2007
13 years 6 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 4 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal