Results 1 - 10
of
1,229
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
, 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract
-
Cited by 1028 (1 self)
- Add to MetaCart
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring
Algorithms for Mining Distance-Based Outliers in Large Datasets
, 1998
"... This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional ath ..."
Abstract
-
Cited by 360 (5 self)
- Add to MetaCart
This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional
On-line Fingerprint Verification
- IEEE Transactions on Pattern Analysis and Machine Intelligence
, 1997
"... Abstract—Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of meeting today’s increasing performance requirements. An automatic fingerprint identification sy ..."
Abstract
-
Cited by 300 (32 self)
- Add to MetaCart
system (AFIS) is widely needed. It plays a very important role in forensic and civilian applications such as criminal identification, access control, and ATM card verification. This paper describes the design and implementation of an on-line fingerprint verification system which operates in two stages
Cards
, 2010
"... (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of ..."
Abstract
- Add to MetaCart
. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.
Distance-Based Outliers: Algorithms and Applications
, 2000
"... . This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional a ..."
Abstract
-
Cited by 185 (0 self)
- Add to MetaCart
. This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional
The Demiphone Versus The Triphone In A Decision-Tree State-Tying Framework
- Proc. ICSLP 98
, 1998
"... The performances of the demiphone (a context dependent subword unit that models independently the left and the right parts of a phoneme) and the triphone are compared. Continuous density hidden Markov modeling for both types of units is tested with the HTK software using decision-tree state clusteri ..."
Abstract
-
Cited by 12 (5 self)
- Add to MetaCart
and phonetically rich words; and numbers of Spanish identification cards and dates. The main conclusion is that the demiphone simplifies the recognition system and yields a better performance than the triphone. This result may be explained by the ability of the demiphone to provide an excellent tradeoff between a
Secure human identification protocols
- In Asiacrypt
, 2001
"... Abstract. One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecti ..."
Abstract
-
Cited by 127 (3 self)
- Add to MetaCart
at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions
AUTOMATIC READING OF SPANISH IDENTITY CARDS
"... This paper describes our developments on the issue of extracting information from images of spanish identity cards. We are using the fact that all spanish citizens (and all legal foreign residents) are provided an identity card by a government agency (this card is called national identity document). ..."
Abstract
- Add to MetaCart
This paper describes our developments on the issue of extracting information from images of spanish identity cards. We are using the fact that all spanish citizens (and all legal foreign residents) are provided an identity card by a government agency (this card is called national identity document
(Spanish Conference on Cryptography and Information Society).
"... Summary: The electronic Spanish Identity Card (DNI-e) aims to provide Spanish citizens with an identification mechanism that enables them to electronically sign documents and improve the level of trust of the Spanish population in the Information Society. This work presents the main features of the ..."
Abstract
- Add to MetaCart
Summary: The electronic Spanish Identity Card (DNI-e) aims to provide Spanish citizens with an identification mechanism that enables them to electronically sign documents and improve the level of trust of the Spanish population in the Information Society. This work presents the main features
Results 1 - 10
of
1,229