Sciweavers

518 search results - page 6 / 104
» Abstract Interpretation-Based Protection
Sort
View
ECCV
2004
Springer
15 years 2 months ago
Capacity and Examples of Template-Protecting Biometric Authentication Systems
Abstract. In this paper, we formulate the requirements for privacy protecting biometric authentication systems. The secrecy capacity Cs is investigated for the discrete and the con...
Pim Tuyls, Jasper Goseling
ICB
2007
Springer
427views Biometrics» more  ICB 2007»
15 years 3 months ago
"3D Face": Biometric Template Protection for 3D Face Recognition
Abstract. In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection ...
Emile J. C. Kelkboom, Berk Gökberk, Tom A. M....
72
Voted
MAS
1998
Springer
152views Communications» more  MAS 1998»
15 years 1 months ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
85
Voted
CN
2006
87views more  CN 2006»
14 years 9 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
64
Voted
FC
2007
Springer
152views Cryptology» more  FC 2007»
15 years 3 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig