-
1
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
-
Goh, A. & Ngo, D.C.L.: Computation of Cryptographic Keys from Face Biometrics, Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Springer-Verlag LNCS 2828 (2003)
-
(2003)
Springer-Verlag LNCS
, vol.2828
-
-
Goh, A.1
Ngo, D.C.L.2
-
4
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
MCB UP Limited
-
Feng, H. & Chan, C.W.; Private Key Generation from On-line Handwritten Signatures, Information Management and Computer Security, MCB UP Limited (2000) 159-164.
-
(2000)
Information Management and Computer Security
, pp. 159-164
-
-
Feng, H.1
Chan, C.W.2
-
5
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometric based on identification scheme
-
Davida, G., Frankel, Y., Matt, B.J. & Peralta, R.: On the Relation of Error Correction and Cryptography to an Off Line Biometric Based on Identification Scheme, WCC99, Workshop on Coding and Cryptography (1999)
-
(1999)
WCC99, Workshop on Coding and Cryptography
-
-
Davida, G.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
6
-
-
0032224440
-
Biometric encryption using image processing
-
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R. & Kumar, B.V.K.V.: Biometric Encryption Using Image Processing. SPIE 3314 (1998) 178-188
-
(1998)
SPIE
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
7
-
-
0034829626
-
Cryptographic key generation from voice
-
Monrose, F., Reiter, M.K., Li, Q. & Wetzel, S.: Cryptographic Key Generation from Voice, Proc. of the 2001 IEEE Symp. on Security and Privacy (2001)
-
(2001)
Proc. of the 2001 IEEE Symp. on Security and Privacy
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
8
-
-
85084163045
-
Toward speech-generated cryptographic keys on resource constrained devices
-
Monrose, F., Reiter, M.K., Li, Q., Lopresti, D.P. & Shih, C.: Toward Speech-Generated Cryptographic Keys on Resource Constrained Devices, Proc. of the 11 th USENIX Security Symposium (2002)
-
(2002)
Proc. of the 11 Th USENIX Security Symposium
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Lopresti, D.P.4
Shih, C.5
-
11
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Clancy, T.C., Kiyavash, N. & Lin, D.J.: Secure Smartcard-based Fingerprint Authentication, in Proc. ACM SIGMM 2993 Multimedia, Biometrics Methods and Applications Workshop (2003) 45-52
-
(2003)
Proc. ACM SIGMM 2993 Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
13
-
-
0017930815
-
Dynamic programming algorithm optimization for spoken word recognition
-
Sakoe, H. & Chiba, S.: Dynamic Programming Algorithm Optimization for Spoken Word Recognition, IEEE Trans. on Acoustics, Speech & Signal Processing, Vol.ASSP-26, No.1 (1978)
-
(1978)
IEEE Trans. on Acoustics, Speech & Signal Processing
, vol.ASSP-26
, Issue.1
-
-
Sakoe, H.1
Chiba, S.2
-
17
-
-
0142088895
-
Online signature verification using a new extreme points warping technique
-
Feng, H. & Chan, C.W.: Online Signature Verification using a New Extreme Points Warping Technique, Pattern Recognition Letters 24 (2003) 2943-2951
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 2943-2951
-
-
Feng, H.1
Chan, C.W.2
-
19
-
-
0024858506
-
Signature recognition through spectral analysis
-
Chan, F.L. & Kamins D.: Signature Recognition through Spectral Analysis, Pattern Recognition, Vol. 22, Issue 1 (1989) 39-44
-
(1989)
Pattern Recognition
, vol.22
, Issue.1
, pp. 39-44
-
-
Chan, F.L.1
Kamins, D.2
|