-
2
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
to appear available online from Aug.
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and Performance," to appear in IEEE Trans. Info. Forensics & Security, available online from Aug. 2007.
-
(2007)
IEEE Trans. Info. Forensics & Security
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
3
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
F. Hao, and C.W. Chan, "Private key generation from on-line handwritten signatures," Information Management & Computer Security, Issue 10, No. 2, pp. 159-164, 2002.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
4
-
-
33745845143
-
Personal authentication using hand images
-
DOI 10.1016/j.patrec.2006.02.021, PII S0167865506000651
-
A. Kumar, D. C. M. Wong, Helen C. Shen, and A. K. Jain, "Personal authentication using hand images", Pattern Recognition Letters, vol. 27, pp. 1478-1486, Oct. 2006. (Pubitemid 44037106)
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.13
, pp. 1478-1486
-
-
Kumar, A.1
Wong, D.C.M.2
Shen, H.C.3
Jain, A.K.4
-
6
-
-
22844441291
-
Personal authentication using multiple palmprint representation
-
DOI 10.1016/j.patcog.2005.03.012, PII S0031320305001330
-
A. Kumar and D. Zhang, "Palmprint authentication using multiple representation," Pattern Recognition, vol. 38, pp.1695-1704, Oct. 2005. (Pubitemid 41037102)
-
(2005)
Pattern Recognition
, vol.38
, Issue.10
, pp. 1695-1704
-
-
Kumar, A.1
Zhang, D.2
-
7
-
-
24644458229
-
Ordinal palmprint representation for personal identification
-
S. Z. L.
-
Z. Sun, T. Tan, Y. Wang, S. Z. L., "Ordinal palmprint representation for personal identification," Proc. CVPR 2005, pp. 279-284, 2005.
-
(2005)
Proc. CVPR 2005
, pp. 279-284
-
-
Sun, Z.1
Tan, T.2
Wang, Y.3
-
8
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Calancy, N. Kiyavash, and D. J. Lin, "Secure Smartcard-based Fingerprint Authentication", ACM SIGMM 2003 Multimedia Workshop on Biometrics Methods and Applications, pp. 45-52, 2003.
-
(2003)
ACM SIGMM 2003 Multimedia Workshop on Biometrics Methods and Applications
, pp. 45-52
-
-
Calancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
9
-
-
26444497730
-
Fuzzy fingerprint vault
-
Cambridge, UK, Aug.
-
U. Uludag and A.K. Jain, "Fuzzy fingerprint vault," Proc. Workshop: Biometrics: Challenges Arising from Theory to Practice, pp. 13-16, Cambridge, UK, Aug. 2004.
-
(2004)
Proc. Workshop: Biometrics: Challenges Arising from Theory to Practice
, pp. 13-16
-
-
Uludag, U.1
Jain, A.K.2
-
10
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
Nov
-
C. H. Lin and Y. Y. Lai, "A flexible biometrics remote user authentication scheme", Computer Standards & Interfaces, vol. 27, no. 1, pp. 19-23, Nov. 2004.
-
(2004)
Computer Standards & Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
11
-
-
79959344393
-
Combining crypto with biometrics efficiently
-
Sep.
-
H. Feng, A. Ross, and J. Daughman, "Combining crypto with biometrics efficiently", IEE Trans. Computers, pp. 1-17, Sep. 2006.
-
(2006)
IEE Trans. Computers
, pp. 1-17
-
-
Feng, H.1
Ross, A.2
Daughman, J.3
-
12
-
-
34147097906
-
Biometrics based asymmetric cryptosystem design using modified fuzzy vault scheme
-
DOI 10.1109/ICPR.2006.330, 1699897, Proceedings - 18th International Conference on Pattern Recognition, ICPR 2006
-
A. Nager and S. Chaudhury, "Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme," Proc. ICPR 2006, pp 537-540, Hong Kong, Aug. 2006. (Pubitemid 46553477)
-
(2006)
Proceedings - International Conference on Pattern Recognition
, vol.4
, pp. 537-540
-
-
Nagar, A.1
Chaudhury, S.2
-
13
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
CCCS
-
F. Monrose, M. K. Reiter and R. Wetzel, "Password hardening based on keystroke dynamics," Proc. th 6 ACM Conf. Computer & Comm., pp. 69-83, CCCS, 1999.
-
(1999)
Proc. Th 6 ACM Conf. Computer & Comm.
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, R.3
-
14
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
F. Hao, and C. W. Chan, "Private key generation from on-line handwritten signatures," Information Management & Computer Security, Issue 10, no. 2, pp. 159-164, 2002.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
15
-
-
84921998298
-
-
RSA algorithm, http://www.di-mgt.com.au/rsa-alg.html.
-
RSA Algorithm
-
-
-
16
-
-
0141725475
-
On-line palmprint identification
-
Sep.
-
D. Zhang, W.K. Kong, J. You, and M. Wong, "On-line palmprint identification," IEEE Trans. Patt. Anal. MachineIntell., vol. 25, pp. 1041-1050, Sep. 2003.
-
(2003)
IEEE Trans. Patt. Anal. MachineIntell
, vol.25
, pp. 1041-1050
-
-
Zhang, D.1
Kong, W.K.2
You, J.3
Wong, M.4
-
17
-
-
25144471298
-
Score normalization in multimodal biometric systems
-
DOI 10.1016/j.patcog.2005.01.012, PII S0031320305000592
-
A. Jain, K. Nandakumar, and A. Ross, "Score Normalization in Multimodal Biometric Systems", Pattern Recognition, vol. 38, pp. 2270-2285, 2005. (Pubitemid 41336698)
-
(2005)
Pattern Recognition
, vol.38
, Issue.12
, pp. 2270-2285
-
-
Jain, A.1
Nandakumar, K.2
Ross, A.3
|