Sciweavers

4018 search results - page 99 / 804
» Biometrics
Sort
View
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 10 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
HPDC
2010
IEEE
15 years 5 months ago
Towards long term data quality in a large scale biometrics experiment
Quality of data plays a very important role in any scientific research. In this paper we present some of the challenges that we face in managing and maintaining data quality for a...
Hoang Bui, Diane Wright, Clarence Helm, Rachel Wit...
CORR
2007
Springer
147views Education» more  CORR 2007»
15 years 4 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
15 years 11 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli
ICPR
2004
IEEE
16 years 5 months ago
Biometrics: A Grand Challenge
Reliable person recognition is an important problem in diverse businesses. Biometrics, recognition based on distinctive personal traits, has the potential to become an irreplaceab...
Anil K. Jain, Sharath Pankanti, Salil Prabhakar, L...