• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,229
Next 10 →

How To Prove Yourself: Practical Solutions to Identification and Signature Problems

by Amos Fiat, Adi Shamir , 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract - Cited by 1028 (1 self) - Add to MetaCart
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring

Algorithms for Mining Distance-Based Outliers in Large Datasets

by Edwin M. Knorr, Raymond T. Ng , 1998
"... This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional ath ..."
Abstract - Cited by 360 (5 self) - Add to MetaCart
This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional

On-line Fingerprint Verification

by Anil Jain, Lin Hong, Ruud Bolle - IEEE Transactions on Pattern Analysis and Machine Intelligence , 1997
"... Abstract—Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of meeting today’s increasing performance requirements. An automatic fingerprint identification sy ..."
Abstract - Cited by 300 (32 self) - Add to MetaCart
system (AFIS) is widely needed. It plays a very important role in forensic and civilian applications such as criminal identification, access control, and ATM card verification. This paper describes the design and implementation of an on-line fingerprint verification system which operates in two stages

Cards

by David A. Cooper, David A. Cooper, Patrick D. Gallagher , 2010
"... (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of ..."
Abstract - Add to MetaCart
. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.

Distance-Based Outliers: Algorithms and Applications

by Edwin M. Knorr, Raymond T. Ng, Vladimir Tucakov , 2000
"... . This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional a ..."
Abstract - Cited by 185 (0 self) - Add to MetaCart
. This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional

The Demiphone Versus The Triphone In A Decision-Tree State-Tying Framework

by José B. Mariño, Pau Pachès-Leal, Jos� B. Mari��o, Albino Nogueiras - Proc. ICSLP 98 , 1998
"... The performances of the demiphone (a context dependent subword unit that models independently the left and the right parts of a phoneme) and the triphone are compared. Continuous density hidden Markov modeling for both types of units is tested with the HTK software using decision-tree state clusteri ..."
Abstract - Cited by 12 (5 self) - Add to MetaCart
and phonetically rich words; and numbers of Spanish identification cards and dates. The main conclusion is that the demiphone simplifies the recognition system and yields a better performance than the triphone. This result may be explained by the ability of the demiphone to provide an excellent tradeoff between a

Secure human identification protocols

by Manuel Blum - In Asiacrypt , 2001
"... Abstract. One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of protocols for secure identification which require various forms of trusted hardware or software, aimed at protecti ..."
Abstract - Cited by 127 (3 self) - Add to MetaCart
at protecting privacy and financial assets. But how do we verify our identity, securely, when we don’t have or don’t trust our smart card, palmtop, or laptop? In this paper, we provide definitions of what we believe to be reasonable goals for secure human identification. We demonstrate that existing solutions

Identification cards — Integrated circuit

by unknown authors
"... cards — ..."
Abstract - Add to MetaCart
cards —

AUTOMATIC READING OF SPANISH IDENTITY CARDS

by O Martín, María P. Villaverde
"... This paper describes our developments on the issue of extracting information from images of spanish identity cards. We are using the fact that all spanish citizens (and all legal foreign residents) are provided an identity card by a government agency (this card is called national identity document). ..."
Abstract - Add to MetaCart
This paper describes our developments on the issue of extracting information from images of spanish identity cards. We are using the fact that all spanish citizens (and all legal foreign residents) are provided an identity card by a government agency (this card is called national identity document

(Spanish Conference on Cryptography and Information Society).

by J. Borrell, J. Herrera, J. Crespo (spanish Dgp, J. Espinosa (safelayer, L. Hernández (csic, H. Rifà (safelayer, M. Torres (safelayer
"... Summary: The electronic Spanish Identity Card (DNI-e) aims to provide Spanish citizens with an identification mechanism that enables them to electronically sign documents and improve the level of trust of the Spanish population in the Information Society. This work presents the main features of the ..."
Abstract - Add to MetaCart
Summary: The electronic Spanish Identity Card (DNI-e) aims to provide Spanish citizens with an identification mechanism that enables them to electronically sign documents and improve the level of trust of the Spanish population in the Information Society. This work presents the main features
Next 10 →
Results 1 - 10 of 1,229
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University