搜索结果: 1-13 共查到“军事学 biometric”相关记录13条 . 查询时间(0.145 秒)
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Information theoretic security key agreement physical unclonable functions
2019/7/8
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
privacy-preserving biometric authentication inner product encryption learning with errors
2018/12/24
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric i...
Privacy-preserving biometric authentication: challenges and directions
biometric authentication applications
2017/5/25
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a mean of authenticating people due to t...
Biometric Based Network Security Using MIPS Cryptography Processor
Biometric Network Security Cryptograph
2016/12/10
The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many re...
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations
Biometric authentication Homomorphic encryption MAC
2016/5/24
Biometric authentication methods are gaining popularity due to their convenience. For an authentication without relying on trusted hardwares, biometrics or their hashed values should be stored in the ...
Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
cryptographic protocols cryptanalysis
2016/1/26
In ESORICS 2015, Wang et al. proposed a privacy-preserving outsourcing design for biometric identification using public cloud platforms, namely CloudBI. CloudBI introduces two designs: CloudBI-I and C...
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System
Side Channel Analysis Hardware Biometric Coprocessor Biometric Comparison
2016/1/26
We study in this work the potential side channel leakages
of a hardware biometric comparison system that has been designed for
fingerprints.
Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System
Cryptographic secret keys Das’s scheme
2016/1/9
Password-based authentication schemes are convenient, but vulnerable to simple dictionary attacks. Cryptographic secret keys are safe, but difficult to memorize. More recently, biometric information h...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Homomorphic encryption LWE assumption
2015/12/29
We explicitly present a homomorphic encryption scheme with a flexible encoding of plaintexts.
We prove its security under the LWE assumption, and innovatively show how the scheme can be
used to hand...
Secure Biometric Authentication With Improved Accuracy
Secure Biometric Authentication Cryptography Classifier
2009/6/5
We propose a new hybrid protocol for cryptographically se-
cure biometric authentication. The main advantages of the proposed pro-
tocol over previous solutions can be summarised as follows: (1) pot...
A Biometric Identity Based Signature Scheme
Biometric Identity Signature biometric information
2009/3/27
We describe an identity based signature scheme that uses biometric information to construct the
public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signe...
Capacity and Examples of Template-Protecting Biometric Authentication Systems
Template-Protecting Biometric Authentication Systems secrecy capacity Cs
2009/3/26
In this paper, we formulate the requirements for privacy pro-
tecting biometric authentication systems. The secrecy capacity Cs is in-
vestigated for the discrete and the continuous case. We present...