An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Biometric Authentication in Infrastructure Security
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Biometrics break-ins and band-aids
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Biometrics: past, present and future
Current security management & Ethical issues of information technology
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Modeling cryptographic properties of voice and voice-based entity authentication
Proceedings of the 2007 ACM workshop on Digital identity management
Embedded biometric data for a secure authentication watermarking
SPPR'07 Proceedings of the Fourth conference on IASTED International Conference: Signal Processing, Pattern Recognition, and Applications
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Biometrics --- How to Put to Use and How Not at All?
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Direct Attacks Using Fake Images in Iris Verification
Biometrics and Identity Management
An efficient algorithm for the implementation of fingerprint authentication on smartcards
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Embedded biometric data for a secure authentication watermarking
SPPRA '07 Proceedings of the Fourth IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Integrating fingerprint verification into the smart card-based healthcare information system
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Cancellable biometerics featuring with tokenised random number
Pattern Recognition Letters
Privacy-enhancing fingerprint authentication using cancelable templates with passwords
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Fingerprint template protection using fuzzy vault
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Information leakage in fuzzy commitment schemes
IEEE Transactions on Information Forensics and Security
HandsDown: hand-contour-based user identification for interactive surfaces
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
Capacity planning for scalable fingerprint authentication
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Workload dispatch planning for real-time fingerprint authentication on a sensor-client-server model
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Approximate message authentication and biometric entity authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A secure fingerprint authentication system on an untrusted computing environment
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A digital watermarking scheme for personal image authentication using eigenface
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Securing biometric templates for reliable identity authentication
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Hiding biometric data for secure transmission
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
An analysis on accuracy of cancelable biometrics based on biohashing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
A high performance fingerprint liveness detection method based on quality related features
Future Generation Computer Systems
SIRIS: secure IRIS authentication system
Proceedings of the Fifth International Conference on Security of Information and Networks
Optimum detection of multiplicative-multibit watermarking for fingerprint images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
A taxonomy of biometric system vulnerabilities and defences
International Journal of Biometrics
Pattern Recognition Letters
A practical implementation of fuzzy fingerprint vault for smart cards
Journal of Intelligent Manufacturing
A novel hand reconstruction approach and its application to vulnerability assessment
Information Sciences: an International Journal
Hi-index | 48.22 |