Private biometrics

Results: 92



#Item
1Security / Prevention / Computer security / Human communication / Humancomputer interaction / Identity management / Password / Biometrics / Access control / Password bank / Private biometrics

HCISEC Workshop Proposal 1 HCI and Security Systems Andrew Patrick National Research Council of Canada

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2002-09-20 12:11:26
2Security / Biometrics / Prevention / Surveillance / Private biometrics / Fuzzy extractor / Password / Authentication / Facial recognition system / Computer security / Biometric passport / Biometric points

CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2007-10-07 17:21:58
3Computing / Security / Concurrent computing / Data management / Cloud storage / Computer networking / Data center / Distributed data storage / Biometrics / Server / Computer security

Chicago Data Center (CHI-3) About CHI-3 SingleHop’s newest data center in the Chicago area is situated in a private, secured campus built and operated by Digital Reality Trust. SingleHop holds a single-tenant, 10-year

Add to Reading List

Source URL: library.singlehop.com

Language: English - Date: 2015-05-20 05:35:52
4Cryptography / Biometrics / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
5Industrial policy / Private sector development / Aarohi / Biometrics

AAROHI VASHISHTHA 1/494A Glenferrie Road Hawthorn 3122 Melbourne E: ; ; M: +Professional Experience Cardno, Australia Project Director, Cambodia Agriculture Val

Add to Reading List

Source URL: www.enterprise-development.org

Language: English - Date: 2016-04-27 04:09:34
6Biometrics / Surveillance / Private biometrics / Security / Fuzzy extractor / Password / Authentication / Facial recognition system / Computer security / Biometric passport / Biometric points

CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2007-10-07 17:21:58
7Biometrics / Computer access control / Security / Cryptographic nonce / Cryptography / Password / Iris recognition / Challengeresponse authentication / Authentication / Private biometrics / Fuzzy extractor

PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-07-06 12:46:22
8Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
9Biometrics / Cryptography / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
10Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
UPDATE