Sciweavers

SECRYPT
2008
222views Business» more  SECRYPT 2008»
15 years 1 months ago
Improved Fuzzy Vault Scheme for Fingerprint Verification
Cengiz Örencik, Thomas Brochmann Pedersen, Er...
72
Voted
SECRYPT
2008
125views Business» more  SECRYPT 2008»
15 years 1 months ago
CSteg: Talking in C Code - Steganography of C Source Code in Text
Jorge Blasco Alís, Julio César Hern&...
SECRYPT
2008
111views Business» more  SECRYPT 2008»
15 years 1 months ago
Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems
Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, ...
SECRYPT
2008
107views Business» more  SECRYPT 2008»
15 years 1 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
71
Voted
SECRYPT
2008
106views Business» more  SECRYPT 2008»
15 years 1 months ago
Enhanced Secure Interface for a Portable e-Voting Terminal
André Zúquete
Business
Top of PageReset Settings