Search Results - "cryptographic key"
-
1
Computation of cryptographic keys from face biometrics
Published 2003“…We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. …”
Get full text
-
2
Personalised cryptographic key generation based on FaceHashing
Published 2004“…In this,paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. …”
Get full text
Get full text
-
3
-
4
Generation of replaceable cryptographic keys from dynamic handwritten signatures
Published 2006“…In this paper, we present a method for generating cryptographic keys that can be replaced if the keys are compromised and without requiring a template signature to be stored. …”
Get full text
-
5
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
Published 2005“…We propose a method of extracting cryptographic key from dynamic handwritten signatures that does not require storage of the biometric template or any statistical information that could be used to reconstruct the biometric data. …”
Get full text
-
6
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
Published 2010“…This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. …”
Get full text
-
7
-
8
Securing Telecommunication Based On Speaker Voice As The Public Key.
Published 2007“…This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. …”
Get full text
Get full text
-
9
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
Published 2007“…In this paper, we propose a new cryptographic key exchange protocol based on Mandelbrot and Julia Fractal sets. …”
Get full text
Get full text
-
10
Simplified channel authentication algorithm for secure quantum key distribution
Published 2014“…Quantum key distribution (QKD) is characterized by the implementation of the principles of quantum mechanics in distributing the symmetric cryptographic key between two communicating stations. The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. …”
Get full text
Get full text
Get full text
-
11
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
Published 2015“…The public key and private key cryptographic key pair that is obtained and shared through trusted authority will used to sign and verify the document file. …”
Get full text
-
12
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
Published 2016“…Thus, this paper presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
Get full text
Get full text
-
13
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
Published 2016“…Thus, this paper presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
Get full text
Get full text
-
14
A robust security framework with bit-flipping attack and timing attack for key derivation functions
Published 2020“…A Key Derivation Function (KDF) derives cryptographic keys from private string and public information. …”
Get full text
Get full text
-
15
Encryption using FPGA
Published 2008“…The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits, this project implements the 128 bit standard on a Field Programming Gate Array (FPGA) using the VHDL, a hardware description language.…”
Get full text
Get full text
-
16
Eigenspace-based face hashing
Published 2004“…We present a novel approach to generating cryptographic keys from biometrics. In our approach, the PCA coefficients of a face image are discretised using a bit-extraction method to n bits. …”
Get full text
-
17
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
Published 2017“…To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the use of photons and physics to generate cryptographic keys.…”
Get full text
Get full text
-
18
Spectral Test via Discrete Tchebichef Transform for Randomness
Published 2011“…A recommendation on the new random test setting for short cryptographic keys shall also be made.…”
Get full text
Get full text
-
19
Adaptive chosen all inputs model for analyzing key derivation functions against bit-flip and timing side-channel attacks
Published 2019“…Cryptographic keys are vital to ensure secure communication and secure electronic transaction. …”
Get full text
Get full text
Get full text
Get full text
-
20
Recognition using robust bit extraction
Published 2005“…This property is useful for generating cryptographic keys. The theoretical results are evaluated on the Olivetti Research Laboratory ( ORL) face database, showing that the extended methods significantly outperform the corresponding standard methods when the number of extracted bits reaches 100. …”
Get full text