Sciweavers

347 search results - page 15 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2006
IEEE
99views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Effect of Time Separation on Coordination Processes and Outcomes: A Case Study
Prior research has discussed and investigated how global teams bridge multiple boundaries (e.g., distance, time, culture) that separate its members and impact the coordination of ...
J. Alberto Espinosa, Cynthia Pickering
HICSS
2000
IEEE
154views Biometrics» more  HICSS 2000»
15 years 2 months ago
User-Interface Design for Medical Informatics: A Case Study of Kaiser Permanente
User interfaces (Uis) for client-server-and Web-based products and services must enable users around the world to access complex data and functions. Solutions to successful user-i...
Aaron Marcus, Karl Wieser, John Armitage, Volker F...
ICIAP
2007
ACM
15 years 4 months ago
Score-level fusion of fingerprint and face matchers for personal verification under "stress" conditions
Fusion of multiple face and fingerprint matchers based on different biometrics for personal authentication has been investigated in the last years. However, the performance achiev...
Gian Luca Marcialis, Fabio Roli
ICIAR
2010
Springer
15 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
BIOID
2008
190views Biometrics» more  BIOID 2008»
14 years 11 months ago
Direct Attacks Using Fake Images in Iris Verification
Abstract. In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris ...
Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Ferna...