메뉴 건너뛰기




Volumn , Issue , 2003, Pages 89-94

A secure fingerprint matching technique

Author keywords

DPA proof; Embedded system; Fingerprint recognition; Secure matching

Indexed keywords

BIOMETRICS; EMBEDDED SYSTEMS; PALMPRINT RECOGNITION; PATTERN RECOGNITION; SIDE CHANNEL ATTACK;

EID: 84926328758     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/982507.982524     Document Type: Conference Paper
Times cited : (36)

References (17)
  • 3
    • 68549099548 scopus 로고    scopus 로고
    • Differential power analysis in the presence of hardware countermeasures
    • Second International Workshop. Proceedings (Lecture Notes in Computer Science Vol. 1965). Spnnger-Verlag Berlin, Germany
    • Clavier, C, Coron J. and Dabbous, N., Differential power analysis in the presence of hardware countermeasures, Cryptographic Hardwareand Embedded Systems - CHES 2000. Second International Workshop. Proceedings (Lecture Notes in Computer Science Vol. 1965). Spnnger-Verlag. 2000, pp. 252-63. Berlin, Germany.
    • (2000) Cryptographic Hardwareand Embedded Systems - CHES 2000 , pp. 252-263
    • Clavier, C.1    Coron, J.2    Dabbous, N.3
  • 5
    • 85028631272 scopus 로고    scopus 로고
    • http://www.gaisler.com.
  • 6
    • 85028662590 scopus 로고    scopus 로고
    • http://www.ThumbPod.com.
  • 7
    • 0025594159 scopus 로고
    • Automated fingerprint recognition using structural matching
    • UK
    • Hrechak, AK and McHugh, JA. Automated fingerprint recognition using structural matching, Pattern Recognition, Vol. 23, no. 8, 1990, pp. 893-904. UK.
    • (1990) Pattern Recognition , vol.23 , Issue.8 , pp. 893-904
    • Hrechak, A.K.1    McHugh, J.A.2
  • 9
    • 34147160283 scopus 로고    scopus 로고
    • Fingerprint minutiae matching based on the local and global structures
    • ICPR-2000. IEEE Comput. Soc. Part Vol. 2. Los Alamitos, CA, USA
    • Jiang, X., Yau, W., Fingerprint minutiae matching based on the local and global structures, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000. IEEE Comput. Soc. Part, Vol. 2, 2000, pp. 1038-41 Vol. 2. Los Alamitos, CA, USA.
    • (2000) Proceedings 15th International Conference on Pattern Recognition , vol.2 , pp. 1038-1041
    • Jiang, X.1    Yau, W.2
  • 11
    • 68549099555 scopus 로고    scopus 로고
    • Using second-order power analysis to attack DPA resistant software
    • Second International Workshop. Proceedings Lecture Notes in Computer Science Spnnger-Verlag Berlin, Germany
    • Messerges, T.S., Using second-order power analysis to attack DPA resistant software, Cryptographic Hardware and Embedded Systems - CHES 2000. Second International Workshop. Proceedings (Lecture Notes in Computer Science Vol. 1965). Spnnger-Verlag. 2000, pp. 238-51. Berlin, Germany.
    • (2000) Cryptographic Hardware and Embedded Systems - CHES 2000 , vol.1965 , pp. 238-251
    • Messerges, T.S.1
  • 12
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Secunty and privacy concerns
    • March-April
    • Prabhakar, S., Pankanti, S., and Jain, A. K, Biometric Recognition: Secunty and Privacy Concerns, IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, March-April 2003.
    • (2003) IEEE Security and Privacy Magazine , vol.1 , Issue.2 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.K.3
  • 13
    • 84893732023 scopus 로고    scopus 로고
    • A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
    • Proceedings of the 28th European Solid-State Circuit Conference. Univ. Bologna Bologna, Italy
    • Tin, K, Akmal, M. and Verbauwhede, I., A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. ESSCIRC 2002. Proceedings of the 28th European Solid-State Circuit Conference. Univ. Bologna. 2002, pp. 403-6. Bologna, Italy.
    • (2002) ESSCIRC 2002 , pp. 403-406
    • Tin, K.1    Akmal, M.2    Verbauwhede, I.3
  • 14
    • 35248825993 scopus 로고    scopus 로고
    • Security encryption algorithms against DPA at the logic level: Next generation smart card technology
    • Lecture Notes Computer Science Sept. Cologne, Germany
    • Tin, K. and Verbauwhede, I., Security encryption algorithms against DPA at the logic level: next generation smart card technology, Workshop on Cryptographic Hardware and Embedded Systems (Lecture Notes Computer Science Vol. 2779), Sept. 2003, pp 125-136, Cologne, Germany.
    • (2003) Workshop on Cryptographic Hardware and Embedded Systems , vol.2779 , pp. 125-136
    • Tin, K.1    Verbauwhede, I.2
  • 15
    • 85028635114 scopus 로고    scopus 로고
    • User's Guide to NIST Fingerprint Image Software (NFIS). NISTIR 6813, National Institute of Standards and Technology
    • User's Guide to NIST Fingerprint Image Software (NFIS). NISTIR 6813, National Institute of Standards and Technology.
  • 16
    • 0032091411 scopus 로고    scopus 로고
    • Novel approach to automated fingerpnnt recognition
    • June Publisher: IEE, UK
    • Wahab A., Chin, S.H., Tan, E.C., Novel approach to automated fingerpnnt recognition. IEE Proceedings: Vision, Image & Signal Processing, Vol. 145, no. 3, June 1998, pp. 160-6. Publisher: IEE, UK.
    • (1998) IEE Proceedings: Vision, Image & Signal Processing , vol.145 , Issue.3 , pp. 160-166
    • Wahab, A.1    Chin, S.H.2    Tan, E.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.