Sciweavers

335 search results - page 3 / 67
» Biometrics and Security
Sort
View
98
Voted
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
15 years 5 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
15 years 5 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
15 years 1 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
106
Voted
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 3 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt