×

Found 181 Documents (Results 1–100)

A study of RF fingerprint feature dimensionality expansion for I/Q signal data extraction. (English) Zbl 07929662

Wang, Wei (ed.) et al., Communications, signal processing, and systems. Proceedings of the 12th international conference, September 6–8, 2023. Volume 1. Singapore: Springer. Lect. Notes Electr. Eng. 1032, 487-495 (2024).
MSC:  94A12 68T10
Full Text: DOI

DP-Loc: a differential privacy-based indoor localization scheme with bilateral privacy protection. (English) Zbl 07883568

Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 293-304 (2024).
MSC:  68Nxx
Full Text: DOI

A modified fuzzy fingerprint vault based on pair-polar minutiae structures. (English) Zbl 1439.94048

Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 482-499 (2018).
MSC:  94A60
Full Text: DOI

Similarity measures for radial data. (English) Zbl 1452.68254

Carvalho, Joao Paulo (ed.) et al., Information processing and management of uncertainty in knowledge-based systems. 16th international conference, IPMU 2016, Eindhoven, The Netherlands, June 20–24, 2016. Proceedings. Part I. Cham: Springer. Commun. Comput. Inf. Sci. 610, 599-611 (2016).
MSC:  68U10 68T10
Full Text: DOI

Space-time trade-offs for the shortest unique substring problem. (English) Zbl 1398.68704

Seok-Hee Hong (ed.), 27th international symposium on algorithms and computation, ISAAC 2016, Sydney, Australia, December 12–14, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-026-2). LIPIcs – Leibniz International Proceedings in Informatics 64, Article 34, 13 p. (2016).
Full Text: DOI

Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. (English) Zbl 1396.94105

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 44-64 (2016).
MSC:  94A62 94A60
Full Text: DOI

Remote IP protection using timing channels. (English) Zbl 1453.68025

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8949, 222-237 (2015).
MSC:  68M25 68M12 94A60
Full Text: DOI

Fooling a liveness-detecting capacitive fingerprint scanner. (English) Zbl 1300.94104

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 484-490 (2012).
MSC:  94A62 68P25
Full Text: DOI

Triangular decomposition of semi-algebraic systems. (English) Zbl 1321.68526

Watt, Stephen M. (ed.), Proceedings of the 35th international symposium on symbolic and algebraic computation, ISSAC 2010, Munich, Germany, July 25–28, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0150-3). 187-194 (2010).
MSC:  68W30 14P10

An improvement of pseudorandomization against unbounded attack algorithms – the case of fingerprint codes. (English) Zbl 1285.94086

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 213-230 (2010).
MSC:  94A60 65C10
Full Text: DOI

A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure. (English) Zbl 1285.94085

Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 194-212 (2010).
MSC:  94A60 94B60
Full Text: DOI

Feature level fusion of biometrics cues: human identification with Doddington’s caricature. (English) Zbl 1200.68212

Ślęzak, D. (ed.) et al., Security technology. International conference, SecTech 2009, held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10846-4/pbk; 978-3-642-10847-1/ebook). Communications in Computer and Information Science 58, 157-164 (2010).
MSC:  68T10

Performance assessment method for a forged fingerprint detection algorithm. (English) Zbl 1214.68329

Park, Jong Hyuk (ed.) et al., Advances in information security and its application. Third international conference, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02632-4/pbk; 978-3-642-02633-1/ebook). Communications in Computer and Information Science 36, 43-49 (2009).
MSC:  68T10
Full Text: DOI

Hardware architecture for ridge extraction in fingerprints: a combinatorial approach. (English) Zbl 1169.68585

Chanda, Bhabatosh (ed.) et al., Advances in intelligent information processing. Tools and applications. Hackensack, NJ: World Scientific (ISBN 978-981-281-898-0/hbk). Statistical Science and Interdisciplinary Research 2, 213-241 (2008).
MSC:  68T10

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field