Sciweavers

485 search results - page 42 / 97
» Authentication by Biometric Verification
Sort
View
ICBA
2004
Springer
163views Biometrics» more  ICBA 2004»
15 years 3 months ago
Personal Identification and Verification: Fusion of Palmprint Representations
This paper aims to study the accuracy and robustness of personal identification or verification systems where palmprint is the only modality available or utilized. Three different ...
Carmen Poon, David C. M. Wong, Helen C. Shen
ICPR
2008
IEEE
15 years 4 months ago
Score based biometric template selection
A biometric identification procedure usually contains two stages: registration and authentication. Most biometric systems capture multiple samples of the same biometric trait (e.g...
Yong Li, Jianping Yin, En Zhu, Chunfeng Hu, Hui Ch...
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 4 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 4 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 2 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt