Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Anahit R. Ghazaryan"'
Publikováno v:
Security and Communication Networks. 2:1-9
Summary We propose a probabilistic model for constructing passwords on the basis of outcomes of biometrical measurements. An algorithm for the transformation of biometrical data to passwords is given. Performance of the authentication scheme is evalu
Autor:
Zair Abdelouahab, Maher Aburrous, Eyidayo Adebola, Babak Akhgar, Sayed Alireza Hashemi Golpayegani, Ja’far Alqatawna, Omar Al-Kadi, Rizik Al-Sayyed, Faisal T. Ammari, Annamalai Annamalai, Manoj Apte, Hamid R. Arabnia, Vladimir B. Balakirsky, Maros Barabas, Gerald Baumgartner, Petra Saskia Bayerl, Timothy Bowden, Ben Brewster, Roman Busse, Petr Chmelar, Seonho Choi, John M. Colombi, Guillermo Covella, Miles Crabill, Evan Damon, David de Andrés, Alberto De la Rosa Algarín, Leonidas Deligiannidis, Nikolaos L. Dellas, Steven A. Demurjian, Alexander Dieser, Steven Drager, Michal Drozd, Hyeonsang Eom, Diogo A.B. Fernandes, Guillermo Francia, Mário M. Freire, Kaleb Ganz, Qigang Gao, Anahit R. Ghazaryan, João V. Gomes, Geff Green, Michael R. Grimaila, Petr Hanacek, Mohammad Hassanzadeh, Peng He, Douglas D. Hodson, Ivan Homoliak, Mihai Horia Zaharia, Claire Humbeutel, Pedro R.M. Inácio, David Jacques, Narges Jahangiri, Kayleigh Johnson, Dimitra I. Kaklamani, Maria N. Koukovini, Sofiane Labidi, Ville Leppänen, Georgios V. Lioudakis, Eleanor Lockley, Denivaldo Lopes, Pascal Lorenz, J. Lu, Jianbing Ma, Jens Mache, Nicolás Macia, Logan O. Mailloux, Héctor Marco, Maria Angel Marquez-Andrade, William McKeever, Davud Mohammadpur, Seyyed Mohammad Reza Farshchi, Falkner Moraes, Jeffrey D. Morris, Anas Najdawi, Samir M.R. Nasserzadeh, Holger Nitsch, Abiodun Olaluwe, Emerson Oliveira, Luis Olsina, Girish Keshav Palshikar, Eugenia I. Papagiannakopoulou, Paul R. Prucnal, Tran Quang Thanh, Victor Raskin, Sampsa Rauti, Yacine Rebahi, Mohammad Reza Movahedisefat, Ismael Ripoll, Hamzeh Roumani, Juan Carlos Ruiz, Sébastien Salva, Maryam Shahpasand, Bhavin J. Shastri, Jawed Siddiqi, Liliana F.B. Soares, Andrew Staniforth, Nary Subramanian, Kun Sun, Fahimeh Tabatabayi, Julia M. Taylor, Cenidalva Teixeira, Ariel Teles, David Thornton, Fernando G. Tinetti, Monica Trifas, Sanjai Veetil, Lakovos S. Venieris, Natalija Vlajic, Richard Weiss, Charlie Wiseman, Ben Wu, Mira Yun, Stassia R. Zafimiharisoa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b974f42c84f7b96d6af58bfa87e57c21
https://doi.org/10.1016/b978-0-12-411474-6.00043-8
https://doi.org/10.1016/b978-0-12-411474-6.00043-8
We propose a network-type scheme of private information retrieval, presented as a modification of the conventional setup, where the user is replaced with two users, the user-sender and the user-receiver. As a result of communication, the user-receive
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::256c0cae11378084258a1b45679479f5
https://doi.org/10.1016/b978-0-12-411474-6.00015-3
https://doi.org/10.1016/b978-0-12-411474-6.00015-3
Publikováno v:
ISIT
We present a combinatorial algorithm for transformation of long input binary strings to short codewords called the passwords. Having received the password and another long binary string, the decoder has to decide whether it can be considered as a cor
Publikováno v:
Advances in Biometrics ISBN: 9783642017926
ICB
ICB
We propose a probabilistic model for constructing passwords on the basis of outcomes of biometrical measurements. An algorithm for the transformation of biometrical data to passwords is given. The performance of the authentication scheme is evaluated
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::516ea5538c622b96b6761605e9860c5d
https://doi.org/10.1007/978-3-642-01793-3_90
https://doi.org/10.1007/978-3-642-01793-3_90
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540899907
BIOID
BIOID
To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a name, and the scheme compares the template of this person and the template asso
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c1cc719e94aeea208d36afe8b85322c2
https://doi.org/10.1007/978-3-540-89991-4_17
https://doi.org/10.1007/978-3-540-89991-4_17
Publikováno v:
Advances in Biometrics ISBN: 9783540745488
ICB
ICB
We present a biometric authentication algorithm with 3 possible outputs: accept the claimed identity, reject the claimed identity, and no answer. The algorithm is based on the model of non-stationary random processes and transformations of realizatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7902ee2befd170b34d98378f591485f8
https://doi.org/10.1007/978-3-540-74549-5_34
https://doi.org/10.1007/978-3-540-74549-5_34
Publikováno v:
ISIT
We present an algorithm for testing the independence of two non-stationary random processes, which is based on the transformation of realizations of the processes to q-ary vectors whose components are uniformly distributed over the set {0, . . . , q