Back to Results
First PageMeta Content
Identification / Information / Fingerprints / Surveillance / Secure multi-party computation / Fingerprint / Iris recognition / Public key fingerprint / Homomorphic encryption / Biometrics / Security / Cryptography


biom-ident-tech-report.dvi
Add to Reading List

Document Date: 2011-09-16 22:47:34


Open Document

File Size: 267,99 KB

Share Result on Facebook

Company

Ford / /

Country

United Arab Emirates / United States / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Computer Science University of California / Engineering University / /

IndustryTerm

multi-party division protocol / privacy-preserving protocol / online computation / actual algorithm / secure protocols / authentication server / face recognition algorithm / face identification algorithm / comparison algorithms / privacy-preserving identification protocol / feature extraction algorithms / flow network / real time / state-ofthe-art protocols / above algorithm / comparison algorithm / generation solution / privacy-preserving face recognition protocol / identification algorithm / similar matching algorithms / secure protocol / depth-first search / biometric processing / fingerprint matching algorithms / online phase / online stages / feature extraction algorithm / face recognition protocol / /

Organization

Pi / Department of Information / US Department of Homeland Security / P2 / University of California / Irvine / P1 / Ministry of Interior / Fingerprint Identification Marina Blanton Department of Computer Science / VIEWπ / University of Notre Dame / /

Person

Wc / Paolo Gasti / Marina Blanton / /

Position

vp / Prime Minister / vp vq / computation Pm / /

Product

FingerCode-based / P2 / /

ProvinceOrState

Oregon / California / /

PublishedMedium

Fairplay / /

Technology

above algorithm / secure two-party protocol / face recognition protocol / known algorithms / feature extraction algorithms / privacy-preserving protocol / private key / face identification algorithm / comparison algorithms / similar matching algorithms / Eigenfaces algorithm / feature extraction algorithm / actual algorithm / identification algorithm / secure FingerCode protocol / encryption / protocol using homomorphic encryption / state-ofthe-art protocols / using homomorphic encryption / two-party protocols / public key / 4.2 Base Protocol / secure protocols / specific fingerprint matching algorithms / comparison algorithm / face recognition algorithm / simulation / secure protocol / privacy-preserving face recognition protocol / privacy-preserving identification protocol / /

SocialTag