Sciweavers

10 search results - page 2 / 2
» Symmetric hash functions for secure fingerprint biometric sy...
Sort
View
ICPR
2006
IEEE
14 years 6 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury
RSKT
2009
Springer
13 years 11 months ago
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Abstract. In this paper, we have proposed a prototype biometrics authentication system based upon fingerprint recognition. The major functional blocks of the proposed authenticati...
Wei Xiang, Bhavin Desai, Paul Wen, Yafeng Wang, Ti...
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
13 years 10 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
13 years 11 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
ACSAC
2009
IEEE
13 years 11 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans