-
2
-
-
33744965143
-
The state of the art in abuse of biometrics
-
Univ. of Twente
-
I. Buham and P. Hartel, The State of the Art in Abuse of Biometrics, CTIT tech. report TRCTIT-05-41, Univ. of Twente, 2005.
-
(2005)
CTIT Tech. Report TRCTIT-05-41
-
-
Buham, I.1
Hartel, P.2
-
3
-
-
43949116287
-
Biometric template security
-
A.K. Jain, K. Nandakumar, and A. Nagar, "Biometric Template Security," EURASIP J. Advances in Signal Processing, special issue on pattern recognition methods for biometrics, vol.2008, 2008, pp. 1-17.
-
(2008)
EURASIP J. Advances in Signal Processing, Special Issue on Pattern Recognition Methods for Biometrics 2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
4
-
-
33645991887
-
Implementation of the usb token system for fingerprint verification
-
LNCS 2749, Springer
-
D. Moon et al., "Implementation of the USB Token System for Fingerprint Verification," Proc. 13th Scandinavian Conf. (SCIA 03), LNCS 2749, Springer, 2003, pp. 998-1005.
-
(2003)
Proc. 13th Scandinavian Conf. (SCIA 03)
, pp. 998-1005
-
-
Moon, D.1
-
5
-
-
37549035934
-
Digital Signature systems based on smart card and fingerprint feature
-
Y. Lin, X. Maozhi, and Z. Zhiming, "Digital Signature Systems Based on Smart Card and Fingerprint Feature," J. Systems Eng. and Electronics, vol.18, no.4, 2007, pp. 825-834.
-
(2007)
J. Systems Eng. and Electronics
, vol.18
, Issue.4
, pp. 825-834
-
-
Lin, Y.1
Maozhi, X.2
Zhiming, Z.3
-
6
-
-
0036573775
-
Smartcards use biometrics
-
"Smartcards Use Biometrics," Biometric Technology Today, vol.10, no.5, 2002, pp. 9-11.
-
(2002)
Biometric Technology Today
, vol.10
, Issue.5
, pp. 9-11
-
-
-
7
-
-
85066944987
-
Keep Your enemies close: Distance bounding against smartcard relay attacks
-
Usenix Assoc., Sept.
-
S. Drimer and S.J. Murdoch, "Keep Your Enemies Close: Distance Bounding against Smartcard Relay Attacks," Proc. Usenix Security Symp., Usenix Assoc., Sept. 2007.
-
(2007)
Proc. Usenix Security Symp.
-
-
Drimer, S.1
Murdoch, S.J.2
-
8
-
-
0042748417
-
Internet x.509 public-key infrastructure certificate management protocols
-
C. Adams and S. Farrell, Internet X.509 Public-Key Infrastructure Certificate Management Protocols, IETF RFC 2510, 1999; www.ietf.org/rfc/rfc2510. txt.
-
(1999)
IETF RFC 2510
-
-
Adams, C.1
Farrell, S.2
-
9
-
-
33744955096
-
Preprocessing of a fingerprint image captured with a mobile Camera
-
LNCS 3832, Springer
-
C. Lee et al., "Preprocessing of a Fingerprint Image Captured with a Mobile Camera," Proc. Int'l Conf. Advances in Biometrics (ICB 06), LNCS 3832, Springer, 2006, pp. 348-355.
-
(2006)
Proc. Int'l Conf. Advances in Biometrics (ICB 06)
, pp. 348-355
-
-
Lee, C.1
-
10
-
-
77950633475
-
The ultimate linux handheld
-
D. Searls and J. Thompson, "The Ultimate Linux Handheld," Linux J., vol.148, 2006, pp. 70-71.
-
(2006)
Linux J.
, vol.148
, pp. 70-71
-
-
Searls, D.1
Thompson, J.2
-
11
-
-
77951880527
-
Biosecurid: A multimodal biometric database
-
in press, Springer; DOI: 10.1007/s10044-009-0151-4
-
J. Fierrez et al., "BiosecurID: A Multimodal Biometric Database," Pattern Analysis & Applications, in press, Springer; DOI: 10.1007/s10044-009-0151-4.
-
Pattern Analysis & Applications
-
-
Fierrez, J.1
-
13
-
-
0034135212
-
Effect of resolution and image quality on combined optical and neural network fingerprint matching
-
C.L. Wilson, C.I. Watson, and E.G. Paek, "Effect of Resolution and Image Quality on Combined Optical and Neural Network Fingerprint Matching," Pattern Recognition, vol.33, no.2, 2000, pp. 317-331.
-
(2000)
Pattern Recognition
, vol.33
, Issue.2
, pp. 317-331
-
-
Wilson, C.L.1
Watson, C.I.2
Paek, E.G.3
-
14
-
-
33744961868
-
Fake Fingerprint detection by odor analysis
-
LNCS 2832, Springer
-
D. Baldisserra et al., "Fake Fingerprint Detection by Odor Analysis," Proc. IARP Int'l Conf. Biometrics (ICB 06), LNCS 2832, Springer, 2006, pp. 265-272.
-
(2006)
Proc. IARP Int'l Conf. Biometrics (ICB 06)
, pp. 265-272
-
-
Baldisserra, D.1
|