Sciweavers

104 search results - page 7 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
AVBPA
2005
Springer
350views Biometrics» more  AVBPA 2005»
15 years 5 months ago
Pose Invariant Face Recognition Under Arbitrary Illumination Based on 3D Face Reconstruction
Pose and illumination changes from picture to picture are two main barriers toward full automatic face recognition. In this paper, a novel method to handle both pose and lighting c...
Xiujuan Chai, Laiyun Qing, Shiguang Shan, Xilin Ch...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
15 years 3 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
104
Voted
PAMI
2007
133views more  PAMI 2007»
14 years 11 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
TCS
2008
14 years 11 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
107
Voted
IANDC
2007
151views more  IANDC 2007»
14 years 11 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke