Sciweavers

485 search results - page 50 / 97
» Authentication by Biometric Verification
Sort
View
FGR
2004
IEEE
94views Biometrics» more  FGR 2004»
15 years 1 months ago
A Symmetric Transformation for LDA-based Face Verification
One of the major problem in face verification is to deal with a few number of images per person to train the system. A solution to that problem is to generate virtual samples from...
Sébastien Marcel
BIOID
2008
190views Biometrics» more  BIOID 2008»
14 years 11 months ago
Direct Attacks Using Fake Images in Iris Verification
Abstract. In this contribution, the vulnerabilities of iris-based recognition systems to direct attacks are studied. A database of fake iris images has been created from real iris ...
Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Ferna...
ARCS
2004
Springer
15 years 1 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
15 years 4 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
HICSS
2005
IEEE
111views Biometrics» more  HICSS 2005»
15 years 3 months ago
Using Information Extraction for Quality Analysis in Human Authentication
During the past decade there have been significant advances in the field of Natural Language Processing (NLP) and, in particular, Information Extraction (IE) [2] which have fueled...
Kiyoshi Sudo, Amit Bagga, Lawrence O'Gorman, Jon L...