-
1
-
-
68149171406
-
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
-
M. Une, A. Otsuka, H. Imai, "Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems", IEICE Transactions on Information and Systems 91(5) (2008) 1380.
-
(2008)
IEICE Transactions on Information and Systems
, vol.91
, Issue.5
, pp. 1380
-
-
Une, M.1
Otsuka, A.2
Imai, H.3
-
2
-
-
71749112206
-
-
Y. Tanabe, K. Yoshizoe, H. Imai, A Study on Security Evaluation Methodology in Finger Vein Authentication Systems, SCIS2008, pp.3B4-2, Jan 2008, Japan. (in Japanese) Distinguished paper award.
-
Y. Tanabe, K. Yoshizoe, H. Imai, "A Study on Security Evaluation Methodology in Finger Vein Authentication Systems", SCIS2008, pp.3B4-2, Jan 2008, Japan. (in Japanese) Distinguished paper award.
-
-
-
-
3
-
-
71749113229
-
-
Y. Tanabe, K. Yoshizoe, H. Imai, Extension of Wolf Search Algorithm in Finger Vein Authentication Systems, SCIS2009, pp.2F4-5 , Jan 2009, Japan. (in Japanese)
-
Y. Tanabe, K. Yoshizoe, H. Imai, "Extension of Wolf Search Algorithm in Finger Vein Authentication Systems", SCIS2009, pp.2F4-5 , Jan 2009, Japan. (in Japanese)
-
-
-
-
4
-
-
71749108710
-
-
N. Miura, A. Nagasaka, T. Miyatake, Feature Extraction of Finger Vein Patterns Based on Iterative Line Tracking and Its Application to Personal Identification??The Transactions of the Institute of Electronics, Information and Communication Engineers D (IEICE Trans.D), J86-D-II no.5, pp.678-687, May 2003??(in Japanese)
-
N. Miura, A. Nagasaka, T. Miyatake, "Feature Extraction of Finger Vein Patterns Based on Iterative Line Tracking and Its Application to Personal Identification"??The Transactions of the Institute of Electronics, Information and Communication Engineers D (IEICE Trans.D), vol.J86-D-II no.5, pp.678-687, May 2003??(in Japanese)
-
-
-
-
5
-
-
39749116248
-
Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles
-
May
-
N. Miura, A. Nagasaka, T. Miyatake, "Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles", Proceedings of the ninth IAPR Conference on Machine Vision Applications, pp.347-350, May 2005.
-
(2005)
Proceedings of the ninth IAPR Conference on Machine Vision Applications
, pp. 347-350
-
-
Miura, N.1
Nagasaka, A.2
Miyatake, T.3
-
6
-
-
84921721874
-
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems
-
M. Inuma, A. Otsuka, H. Imai, "Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems", International Conference on Biometrics 2009.
-
(2009)
International Conference on Biometrics
-
-
Inuma, M.1
Otsuka, A.2
Imai, H.3
-
7
-
-
71749099361
-
-
CSS, Jan, Japan, in Japanese
-
Y. Kojima, R. Shigetomi, M. Inuma, A. Otsuka, H. Imai, "An Efficient and Secure Protocol in a Framework of Matching Algorithms Based on Wolf Attack Probability", CSS2008, pp. 809-814, Jan 2008, Japan. (in Japanese)
-
(2008)
An Efficient and Secure Protocol in a Framework of Matching Algorithms Based on Wolf Attack Probability
, pp. 809-814
-
-
Kojima, Y.1
Shigetomi, R.2
Inuma, M.3
Otsuka, A.4
Imai, H.5
-
8
-
-
71749106887
-
-
N. Wanatabe, R. Shigetomi, K. Yoshizoe, M. Une, A. Otsuka, H. Imai, Universal Wolves in a Matching Algorithm for Finger Vein Patterns - A Study on the Feature Extraction Process-, SCIS2007, pp.3F3-3, Jan 2007, Japan. (in Japanese)
-
N. Wanatabe, R. Shigetomi, K. Yoshizoe, M. Une, A. Otsuka, H. Imai, "Universal Wolves in a Matching Algorithm for Finger Vein Patterns - A Study on the Feature Extraction Process-", SCIS2007, pp.3F3-3, Jan 2007, Japan. (in Japanese)
-
-
-
-
9
-
-
71749096373
-
-
R. Kawakami, R. Shigetomi, K. Yoshizoe, M. Une, A. Otsuka, H. Imai, A Theoretical Study on Wolves in Minutiae Matching Algorithm, SCIS2007, pp.3F3-2, Jan 2007 Japan. (in Japanese)
-
R. Kawakami, R. Shigetomi, K. Yoshizoe, M. Une, A. Otsuka, H. Imai, "A Theoretical Study on Wolves in Minutiae Matching Algorithm", SCIS2007, pp.3F3-2, Jan 2007 Japan. (in Japanese)
-
-
-
-
10
-
-
0036568025
-
Finite-time Analysis of the Multi-armed Bandit Problem
-
P. Auer, N. Cesa-Bianchi, and P. Fischer, "Finite-time Analysis of the Multi-armed Bandit Problem", Machine Learning, AFC2002, Machine Learning, 47, 235-256
-
Machine Learning, AFC2002, Machine Learning
, vol.47
, pp. 235-256
-
-
Auer, P.1
Cesa-Bianchi, N.2
Fischer, P.3
-
12
-
-
0002899547
-
Asymptotically Efficient Adaptive Allocation Rules
-
6 pp
-
T. L. Lai and H. Robbins, "Asymptotically Efficient Adaptive Allocation Rules", LR1985, Advances in Applied Mathematics, vol.6 pp.4-22, 1985
-
(1985)
Advances in Applied Mathematics
, vol.LR1985
, pp. 4-22
-
-
Lai, T.L.1
Robbins, H.2
|