搜索结果: 1-15 共查到“Biometric”相关记录24条 . 查询时间(0.078 秒)
Coupling Photosynthetic Measurements with Biometric Data to Estimate Gross Primary Productivity (GPP) in Mediterranean Pine Forests of Different Post-Fire Age
Pinus brutia carbon fluxes leaf area index light response curve conifer forests
2023/12/15
Quantification of forest Gross Primary Productivity (GPP) is important for understanding ecosystem function and designing appropriate carbon mitigation strategies. Coupling forest biometric data with ...
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Information theoretic security key agreement physical unclonable functions
2019/7/8
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
privacy-preserving biometric authentication inner product encryption learning with errors
2018/12/24
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric i...
Privacy-preserving biometric authentication: challenges and directions
biometric authentication applications
2017/5/25
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a mean of authenticating people due to t...
MODELLING OF BIOMETRIC IDENTIFICATION SYSTEM WITH GIVEN PARAMETERS USING COLORED PETRI NETS
Photogrammetry Colored Petri Nets Automation Feature Detection Biometry Odontology Tooth Structure
2017/6/19
Biometric identification systems use given parameters and function on the basis of Colored Petri Nets as a modelling language developed for systems in which communication, synchronization and distribu...
Biometric Based Network Security Using MIPS Cryptography Processor
Biometric Network Security Cryptograph
2016/12/10
The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many re...
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations
Biometric authentication Homomorphic encryption MAC
2016/5/24
Biometric authentication methods are gaining popularity due to their convenience. For an authentication without relying on trusted hardwares, biometrics or their hashed values should be stored in the ...
Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
cryptographic protocols cryptanalysis
2016/1/26
In ESORICS 2015, Wang et al. proposed a privacy-preserving outsourcing design for biometric identification using public cloud platforms, namely CloudBI. CloudBI introduces two designs: CloudBI-I and C...
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Side Channel Analysis Hardware Biometric Coprocessor Biometric Comparison
2016/1/26
We study in this work the potential side channel leakages
of a hardware biometric comparison system that has been designed for
fingerprints.
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Cryptographic secret keys Das’s scheme
2016/1/9
Password-based authentication schemes are convenient, but vulnerable to simple dictionary attacks. Cryptographic secret keys are safe, but difficult to memorize. More recently, biometric information h...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Homomorphic encryption LWE assumption
2015/12/29
We explicitly present a homomorphic encryption scheme with a flexible encoding of plaintexts.
We prove its security under the LWE assumption, and innovatively show how the scheme can be
used to hand...
MODELING OF BIOMETRIC IDENTIFICATION SYSTEM USING THE COLORED PETRI NETS
Petri Net (PN) Colored Petri Net (CPN) position transition
2015/5/21
In this paper we present a model of biometric identification system transformed into Petri Nets. Petri Nets, as a graphical and
mathematical tool, provide a uniform environment for modelling, formal...
Factor Analysis of Biometric Traits of Kankrej Cows to Explain Body Conformation
Biometric Traits Body Conformation Factor Analysis Principal Component Analysis Kankrej Cattle
2016/5/6
Eighteen different biometric traits in 407 Kankrej cows from their breeding zone, i.e. Palanpur district of Gujarat, India, were recorded and analyzed by factor analysis to explain body conformation. ...
Intelligent Biometric Information Management
Authentication Biometrics Boosting Change Detection Complexity Cross-Matching Data Fusion Ensemble Methods Forensics Identity Management Imposters Inference Intelligent Information Management Margin gain MDL Multi-Sensory Integration Outlier Detection P-Values Quality Randomness Ranking Score Normalization Semi-Supervised Learning Spectral Clustering Strangeness Surveillance Tracking Typicality Transduction
2013/1/29
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learni...