Sciweavers

24529 search results - page 100 / 4906
» Computing on Authenticated Data
Sort
View
ECCV
2006
Springer
16 years 2 months ago
Face Authentication Using Adapted Local Binary Pattern Histograms
In this paper, we propose a novel generative approach for face authentication, based on a Local Binary Pattern (LBP) description of the face. A generic face model is considered as ...
Sébastien Marcel, Yann Rodriguez
81
Voted
DAC
2007
ACM
16 years 1 months ago
Physical Unclonable Functions for Device Authentication and Secret Key Generation
Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that...
G. Edward Suh, Srinivas Devadas
100
Voted
ICPR
2008
IEEE
15 years 7 months ago
Scribble-a-Secret: Similarity-based password authentication using sketches
This paper presents a sketch-based password authentication system called Scribble-a-Secret as a graphical password scheme in which free-form drawings are used as a means to authen...
Mizuki Oka, Kazuhiko Kato, Yingqing Xu, Lin Liang,...
104
Voted
ICPR
2008
IEEE
15 years 7 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma
102
Voted
ICCSA
2007
Springer
15 years 6 months ago
An Enhanced ID-Based Deniable Authentication Protocol on Pairings
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al....
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...