Back to Results
First PageMeta Content
Security / Mathematics / Information / Hadamard code / Iris recognition / Private biometrics / Two-factor authentication / Password / Keystroke dynamics / Error detection and correction / Coding theory / Biometrics


IEEE TRANSACTIONS ON COMPUTERS, VOL. 55, NO. 9, SEPTEMBER 2006
Add to Reading List

Document Date: 2007-07-11 11:36:24


Open Document

File Size: 848,36 KB

Share Result on Facebook

City

New York / Cambridge / /

Company

IBM / AES / LG / Decoding / McGraw-Hill / Computer Laboratory / Building Dependable Distributed Systems / Toshiba / 4 Concatenated Encoding / VOL / /

Country

Netherlands / Sudan / United Kingdom / /

Currency

USD / /

/

Event

Product Issues / /

Facility

Computer Laboratory / Tokyo Institute of Technology / Nanyang Technological University / University of Groningen / University of Cambridge / To bridge / Digital Library / Harvard University / /

IndustryTerm

chip-testing technology / biometric systems / well-understood technology / bank account / inner product / biometric technology / software returns / preparatory signal processing / iris recognition algorithms / possible applications / biometric applications / security technologies / cryptographic applications / bank / neural computing / phase-phase product / public reluctant to use systems / hardware devices / biometric identification technology / banking / Internet Based Applications / typical subjectidentification applications / signal processor / search effort / /

Organization

Int’l Federation for Information Processing / Harvard University / Cambridge Univ. / Nanyang Technological University / Singapore / Foundation for Information Policy Research / Uludag / Australian Ministry of Defence / Univ. of Cambridge / British Computer Society / University of Cambridge / Tokyo Institute of Technology / University of Groningen / IEEE Computer Society / /

Person

Ross Anderson / John Daugman / Biometrics Effectively Feng Hao / HAO ET AL / David Wheeler / K. Vijaya Kumar / /

Position

extractor / teller / Johann Bernoulli Chair / fuzzy extractor / professor of security engineering / Presidential Young Investigator / one of the founders / Endowed Chair / /

Product

Skullcandy G.I. Headphone/Headset / Sylvester / Data / /

PublishedMedium

IEEE TRANSACTIONS ON COMPUTERS / /

Region

North Holland / /

Technology

Biometric Encryption / iris recognition algorithms / peer-to-peer / Information Technology / API / smart card / Private Key / secret key / biometric identification technology / Daugman algorithms / encryption / well-understood technology / security technologies / 3 ALGORITHMS / cryptography / biometric technology / automatic identification / Berlekamp-Massey algorithm / digital signature / chip-testing technology / Digital Signature Technologies / /

URL

http /

SocialTag