Sciweavers

335 search results - page 27 / 67
» Biometrics and Security
Sort
View
71
Voted
ICPR
2008
IEEE
15 years 8 months ago
A cryptosystem based on palmprint feature
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the tradition...
Xiangqian Wu, Kuanquan Wang, David Zhang
ICIAR
2010
Springer
15 years 6 months ago
Secure Iris Recognition Based on Local Intensity Variations
In this paper we propose a fast and efficient iris recognition algorithm which makes use of local intensity variations in iris textures. The presented system provides fully revocab...
Christian Rathgeb, Andreas Uhl
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
14 years 11 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
14 years 12 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
95
Voted
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 7 months ago
CANDI: A System for Classifying the Security Risks in Network Appliances
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user a...
Joseph G. Tront, Randy C. Marchany