Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification (English)
- New search for: Park, Byungkwan
- New search for: Moon, Daesung
- New search for: Chung, Yongwha
- New search for: Park, Jin-Won
- New search for: Park, Byungkwan
- New search for: Moon, Daesung
- New search for: Chung, Yongwha
- New search for: Park, Jin-Won
In:
Information Security Applications
3
;
110-120
;
2007
- Article/Chapter (Book) / Electronic Resource
-
Title:Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
-
Contributors:Park, Byungkwan ( author ) / Moon, Daesung ( author ) / Chung, Yongwha ( author ) / Park, Jin-Won ( author )
-
Published in:Information Security Applications , 3 ; 110-120Lecture Notes in Computer Science ; 4298, 3 ; 110-120
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2007-01-01
-
Size:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Controllable Ring SignaturesGao, Wei / Wang, Guilin / Wang, Xueli / Xie, Dongqing et al. | 2007
- 15
-
Efficient User Authentication and Key Agreement in Wireless Sensor NetworksJuang, Wen-Shenq et al. | 2007
- 30
-
Identity-Based Key Issuing Without Secure Channel in a Broad AreaKwon, Saeran / Lee, Sang-Ho et al. | 2007
- 45
-
PolyI-D: Polymorphic Worm Detection Based on Instruction DistributionLee, Ki Hun / Kim, Yuna / Hong, Sung Je / Kim, Jong et al. | 2007
- 60
-
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor NetworksMa, Jianqing / Zhang, Shiyong / Zhong, Yiping / Tong, Xiaowen et al. | 2007
- 74
-
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise AlignmentPark, Jae-Chul / Noh, Bong-Nam et al. | 2007
- 83
-
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification AlgorithmPaek, Seung-Hyun / Oh, Yoon-Keun / Lee, Do-Hoon et al. | 2007
- 100
-
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with PasswordsMoon, Daesung / Lee, Sungju / Jung, Seunghwan / Chung, Yongwha / Yi, Okyeon / Lee, Namil / Moon, Kiyoung et al. | 2007
- 110
-
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint VerificationPark, Byungkwan / Moon, Daesung / Chung, Yongwha / Park, Jin-Won et al. | 2007
- 121
-
Quality Assurance for Evidence Collection in Network ForensicsCheng, Bo-Chao / Chen, Huan et al. | 2007
- 133
-
Visualization of Permission Checks in Java Using Static AnalysisKim, Yoonkyung / Chang, Byeong-Mo et al. | 2007
- 147
-
Deployment of Virtual Machines in Lock-KeeperCheng, Feng / Meinel, Christoph et al. | 2007
- 160
-
Investigations of Power Analysis Attacks and Countermeasures for ARIAYoo, HyungSo / Herbst, Christoph / Mangard, Stefan / Oswald, Elisabeth / Moon, SangJae et al. | 2007
- 173
-
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection ProtocolsLee, Mun-Kyu / Min, Jung Ki / Kang, Seok Hun / Chung, Sang-Hwa / Kim, Howon / Kim, Dong Kyue et al. | 2007
- 187
-
A Novel Key Agreement Scheme in a Multiple Server EnvironmentChang, Chin-Chen / Wu, Chia-Chi et al. | 2007
- 198
-
Cost-Effective IDS Operating Scheme in MANETsJeong, Youngok / Han, Younggoo / Kim, Hyunwoo / Shim, Woochul / Kim, Jaehong / Kim, Sehun et al. | 2007
- 211
-
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6Kang, Hyun-Sun / Park, Chang-Seop et al. | 2007
- 225
-
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile PhonesTanaka, Michiru / Teshigawara, Yoshimi et al. | 2007
- 237
-
Distributed Management of OMA DRM DomainsVasanta, Harikrishna / Safavi-Naini, Reihaneh / Sheppard, Nicholas Paul / Surminen, Jan Martin et al. | 2007
- 252
-
New Traceability Codes Against a Generalized Collusion Attack for Digital FingerprintingYagi, Hideki / Matsushima, Toshiyasu / Hirasawa, Shigeichi et al. | 2007
- 267
-
A Key Management Based on Multiple Regression in Hierarchical Sensor NetworkKim, Mihui / Doh, Inshil / Chae, Kijoon et al. | 2007
- 282
-
Random Visitor: A Defense Against Identity Attacks in P2P Overlay NetworksGu, Jabeom / Nah, Jaehoon / Chae, Cheoljoo / Lee, Jaekwang / Jang, Jongsoo et al. | 2007
- 297
-
Privacy Protection in PKIs: A Separation-of-Authority ApproachKwon, Taekyoung / Cheon, Jung Hee / Kim, Yongdae / Lee, Jae-Il et al. | 2007
- 312
-
Three-Party Password Authenticated Key Agreement Resistant to Server CompromiseKwon, Taekyoung / Lee, Dong Hoon et al. | 2007
- 324
-
Privacy-Enhanced Content Distribution and Charging Scheme Using Group SignatureTobita, Takayuki / Yamamoto, Hironori / Doi, Hiroshi / Majima, Keigo et al. | 2007
- 339
-
Secret Handshake with Multiple GroupsYamashita, Naoyuki / Tanaka, Keisuke et al. | 2007
- 349
-
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APsPark, Chanil / Hur, Junbeom / Kim, Chanoe / Shin, Young-joo / Yoon, Hyunsoo et al. | 2007
- 364
-
EAP Using the Split Password-Based Authenticated Key AgreementRyu, Jongho et al. | 2007
- 381
-
How Many Malicious Scanners Are in the Internet?Kikuchi, Hiroaki / Terada, Masato et al. | 2007
- 391
-
E-Passport: The Global Traceability Or How to Feel Like a UPS PackageCarluccio, Dario / Lemke-Rust, Kerstin / Paar, Christof / Sadeghi, Ahmad-Reza et al. | 2007