메뉴 건너뛰기




Volumn 5379 LNCS, Issue , 2009, Pages 211-224

Image-feature based human identification protocols on limited display devices

Author keywords

[No Author keywords available]

Indexed keywords

FEATURE-BASED; HUMAN IDENTIFICATION; USER AUTHENTICATION; USER SURVEYS;

EID: 70350647479     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00306-6_16     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 1
    • 77950846494 scopus 로고    scopus 로고
    • Jameel, H., Shaikh, R.A., Lee, H., Lee, S.: Human identification through image evaluation using secret predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 67-84. Springer, Heidelberg (2006)
    • Jameel, H., Shaikh, R.A., Lee, H., Lee, S.: Human identification through image evaluation using secret predicates. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 67-84. Springer, Heidelberg (2006)
  • 2
    • 84995399871 scopus 로고
    • Human Identification through Insecure Channel
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Matsumoto, T., Imai, H.: Human Identification through Insecure Channel. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 409-421. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 409-421
    • Matsumoto, T.1    Imai, H.2
  • 4
    • 84957372142 scopus 로고
    • On the Matsumoto and Imai's Human Identification Scheme
    • Guillou, L.C, Quisquater, J.-J, eds, EUROCRYPT 1995, Springer, Heidelberg
    • Wang, C.H., Hwang, T., Tsai, J.J.: On the Matsumoto and Imai's Human Identification Scheme. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 382-392. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.921 , pp. 382-392
    • Wang, C.H.1    Hwang, T.2    Tsai, J.J.3
  • 6
    • 0042044284 scopus 로고    scopus 로고
    • Practical Human-Machine Identification over Insecure Channels
    • Li, X.-Y., Teng, S.-H.: Practical Human-Machine Identification over Insecure Channels. Journal of Combinatorial Optimization 3, 347-361 (1999)
    • (1999) Journal of Combinatorial Optimization , vol.3 , pp. 347-361
    • Li, X.-Y.1    Teng, S.-H.2
  • 7
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 12
    • 33751057130 scopus 로고    scopus 로고
    • Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
    • Weinshall, D.: Cognitive Authentication Schemes Safe Against Spyware (Short Paper). In: IEEE Symposium on Security and Privacy, pp. 295-300 (2006)
    • (2006) IEEE Symposium on Security and Privacy , pp. 295-300
    • Weinshall, D.1
  • 13
    • 79956309769 scopus 로고    scopus 로고
    • Cryptanalysis of a Cognitive Authentication Scheme. Cryptology ePrint Archive
    • Report 2006/258
    • Golle, P., Wagner, D.: Cryptanalysis of a Cognitive Authentication Scheme. Cryptology ePrint Archive, Report 2006/258, http://eprint.iacr.org/
    • Golle, P.1    Wagner, D.2
  • 14
    • 84947928286 scopus 로고    scopus 로고
    • Bellare, M.: Practice-Oriented Provable-Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, 1396, pp. 221-231. Springer, Heidelberg (1998)
    • Bellare, M.: Practice-Oriented Provable-Security. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 221-231. Springer, Heidelberg (1998)
  • 15
    • 70350678234 scopus 로고    scopus 로고
    • Using Image Attributes for Human Identification Protocols
    • Technical Report, CoRR abs/0704.2295
    • Jameel, H., Lee, H., Lee, S.: Using Image Attributes for Human Identification Protocols. Technical Report, CoRR abs/0704.2295 (2007), http://arxiv.org/abs/0704.2295
    • (2007)
    • Jameel, H.1    Lee, H.2    Lee, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.