نتایج جستجو برای: identification key

تعداد نتایج: 936593  

Journal: :IEEE Trans. Pattern Anal. Mach. Intell. 2001
Sharath Pankanti Salil Prabhakar Anil K. Jain

ÐFingerprint identification is based on two basic premises: 1) persistence: the basic characteristics of fingerprints do not change with time and 2) individuality: the fingerprint is unique to an individual. The validity of the first premise has been established by the anatomy and morphogenesis of friction ridge skin. While the second premise has been generally accepted to be true based on empi...

Journal: :Theor. Comput. Sci. 2014
Guomin Yang Chik How Tan Yi Mu Willy Susilo Duncan S. Wong

Cryptographic identification schemes allow a remote user to prove his/her identity to a verifier who holds some public information of the user, such as the user public key or identity. Most of the existing cryptographic identification schemes are based on number-theoretic hard problems such as Discrete Log and Factorization. This paper focuses on the design and analysis of identity based identi...

Journal: :IACR Cryptology ePrint Archive 2008
Jorge Munilla Alberto Peinado

Singelée and Preneel have recently proposed a enhancement of Hancke and Kuhn’s distance bounding protocol for RFID. The authors claim that their protocol offers substantial reductions in the number of rounds, though preserving its advantages: suitable to be employed in noisy wireless environments, and requiring so few resources to run that it can be implemented on a low-cost device. Subsequentl...

2013
Yingjiu Li Robert H. Deng Elisa Bertino

 Our major contribution in this field is to clarify the differences between two RFID privacy notions: one based on the indistinguishability of two tags (denoted as ind-privacy), and the other based on the unpredictability of the output of a protocol (denoted as unp-privacy). It is proven that ind-privacy is weaker than unp-privacy. Moreover, the minimal (necessary and sufficient) condition on ...

Journal: :J. UCS 2007
Cesar Sanín Edward Szczerbicki Carlos Toro

Collecting, distributing and sharing knowledge in a knowledge-explicit way is a significant task for any company. However, collecting decisional knowledge in the form of formal decision events as the fingerprints of a company is an utmost advance. Such decisional fingerprint is called decisional DNA. Set of experience knowledge structure can assist on accomplishing this purpose. In addition, On...

2011
Alfred Kobsa Rishab Nithyanand Gene Tsudik Ersin Uzun

The recent emergence of RFID tags capable of performing public key operations has enabled a number of new applications in commerce (e.g., RFIDenabled credit cards) and security (e.g., ePassports and access-control badges). While the use of public key cryptography in RFID tags mitigates many difficult security issues, certain important usability-related issues remain, particularly when RFID tags...

2002
Haiping Lu Xudong Jiang Wei-Yun Yau

Minutiae extraction is a crucial step in an automatic fingerprint identification system. However, the presence of noise in poor-quality images causes a large number of extraction errors, including the dropping of true minutiae and production of false minutiae. A study on these errors reveals that postprocessing is effective in removing false minutiae while keeping true ones. Furthermore, the ov...

2002
Myungsun Kim Kwangjo Kim

We introduce a new identification scheme based on the Gap Diffie-Hellman problem. Our identification scheme makes use of the fact that the computational Diffie-Hellman problem is hard in the additive group of points of an elliptic curve over a finite field, on the other hand, the decisional Diffie-Hellman problem is easy in the multiplicative group of the finite field mapped by a bilinear map. ...

2011
Tieyan Li Yingjiu Li Guilin Wang

In this paper, we present a fine-grained view of an RFIDenabled supply chain and tackle the secure key distribution problem on a peer-to-peer base. In our model, we focus on any pair of consecutive parties along a supply chain, who agreed on a transaction and based on which, certain RFID-tagged goods are to be transferred by a third party from one party to the other as in common supply chain pr...

Journal: :Theor. Comput. Sci. 1998
Yosuke Hayashi Satoshi Matsumoto Ayumi Shinohara Masayuki Takeda

We consider the exact learning in the query model. We deal with all types of queries introduced by Angluin: membership, equivalence, superset, subset, disjointness and exhaustiveness queries, and their weak (or restricted) versions where no counterexample is returned. For each of all possible combinations of these queries, we uniformly give complete characterizations of boolean concept classes ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید