Sciweavers

375 search results - page 10 / 75
» Using Mobile Agents for Secure Biometric Authentication
Sort
View
ICIP
2005
IEEE
15 years 11 months ago
Generalized optimal thresholding for biometric key generation using face images
1 In this paper, we study biometric key generation using face images. Given a face image, a set of biometric features are extracted. Each feature is compared with a threshold to ge...
Wende Zhang, Tsuhan Chen
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
DRM
2007
Springer
15 years 3 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
ICSNC
2007
IEEE
15 years 3 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 1 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...