Sciweavers

128 search results - page 17 / 26
» A Proposal of One-Time Biometric Authentication
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
IWBRS
2005
Springer
145views Biometrics» more  IWBRS 2005»
15 years 3 months ago
Face Authentication Using One-Class Support Vector Machines
Abstract. This paper proposes a new method for personal identity verification based the analysis of face images applying One Class Support Vector Machines. This is a recently intr...
Manuele Bicego, Enrico Grosso, Massimo Tistarelli
ICAI
2004
14 years 11 months ago
Use of Histogram Distances in Iris Authentication
Quantitatively establishing the discriminative power of iris biometric data is considered. Multi-level 2D wavelet transform has been widely used for iris verification system. Whil...
Seung-Seok Choi, Sungsoo Yoon, Sung-Hyuk Cha, Char...
85
Voted
CCS
2008
ACM
14 years 11 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
APNOMS
2007
Springer
15 years 3 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo