Search Results - "cryptographic key"

Refine Results
  1. 1

    Computation of cryptographic keys from face biometrics by Goh,, A, Ngo,, DCL

    Published 2003
    “…We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. …”
    Get full text
  2. 2

    Personalised cryptographic key generation based on FaceHashing by TEOH, A

    Published 2004
    “…In this,paper, we proposed a novel two-stage technique to generate personalized cryptographic keys from the face biometric, which offers the inextricably link to its owner. …”
    Get full text
    Get full text
  3. 3
  4. 4

    Generation of replaceable cryptographic keys from dynamic handwritten signatures by Yip, , WK, Goh, , A, Ngo, , DCL, Teoh, , ABJ

    Published 2006
    “…In this paper, we present a method for generating cryptographic keys that can be replaced if the keys are compromised and without requiring a template signature to be stored. …”
    Get full text
  5. 5

    Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability by Kuan, , YW, Teoh, , A, Ngo, , D, Goh, , A

    Published 2005
    “…We propose a method of extracting cryptographic key from dynamic handwritten signatures that does not require storage of the biometric template or any statistical information that could be used to reconstruct the biometric data. …”
    Get full text
  6. 6

    ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys by Radmand, Pedram, Domingo, M., Singh, Jaipal, Arnedo, J., Talevski, Alex, Petersen, S., Carlsen, S.

    Published 2010
    “…This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. …”
    Get full text
  7. 7
  8. 8

    Securing Telecommunication Based On Speaker Voice As The Public Key. by Enayah, Monther Rateb, Samsudin, Azman

    Published 2007
    “…This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. …”
    Get full text
    Get full text
  9. 9

    New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets. by Alia, Mohammad Ahmad, Samsudin, Azman

    Published 2007
    “…In this paper, we propose a new cryptographic key exchange protocol based on Mandelbrot and Julia Fractal sets. …”
    Get full text
    Get full text
  10. 10

    Simplified channel authentication algorithm for secure quantum key distribution by Elwadeya, Mohamed Youssef Khalaf, Al-Khateeb, Khalid A. Saeed, Hasbullah, Nurul Fadzlin

    Published 2014
    “…Quantum key distribution (QKD) is characterized by the implementation of the principles of quantum mechanics in distributing the symmetric cryptographic key between two communicating stations. The quantum channel through which a light beam travels and then examined quantum-mechanically is governed by several quantum cryptographic protocols. …”
    Get full text
    Get full text
    Get full text
  11. 11

    Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan by Ismail @ Hassan, Noor Azlina

    Published 2015
    “…The public key and private key cryptographic key pair that is obtained and shared through trusted authority will used to sign and verify the document file. …”
    Get full text
  12. 12

    A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement by Ramli, Sofia Najwa, Ahmad, Rabiah, Abdollah, Mohd Faizal

    Published 2016
    “…Thus, this paper presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
    Get full text
    Get full text
  13. 13

    A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement by Ramli, Sofia Najwa, Ahmad, Rabiah, Abdollah, Mohd Faizal

    Published 2016
    “…Thus, this paper presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
    Get full text
    Get full text
  14. 14

    A robust security framework with bit-flipping attack and timing attack for key derivation functions by Wen Koh, Wen, Wen Chuah, Chai

    Published 2020
    “…A Key Derivation Function (KDF) derives cryptographic keys from private string and public information. …”
    Get full text
    Get full text
  15. 15

    Encryption using FPGA by Nor Robaini, Ibrahim

    Published 2008
    “…The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits, this project implements the 128 bit standard on a Field Programming Gate Array (FPGA) using the VHDL, a hardware description language.…”
    Get full text
    Get full text
  16. 16

    Eigenspace-based face hashing by Ngo, , DCL, Goh,, A, Teoh, , ABJ

    Published 2004
    “…We present a novel approach to generating cryptographic keys from biometrics. In our approach, the PCA coefficients of a face image are discretised using a bit-extraction method to n bits. …”
    Get full text
  17. 17

    Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Anwar, Farhat, Pampori, Bisma Rasool

    Published 2017
    “…To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the use of photons and physics to generate cryptographic keys.…”
    Get full text
    Get full text
  18. 18

    Spectral Test via Discrete Tchebichef Transform for Randomness by Abu, N. A.

    Published 2011
    “…A recommendation on the new random test setting for short cryptographic keys shall also be made.…”
    Get full text
    Get full text
  19. 19
  20. 20

    Recognition using robust bit extraction by Ngo, David C. L., Goh, Alwyn, Teoh, Andrew B. J.

    Published 2005
    “…This property is useful for generating cryptographic keys. The theoretical results are evaluated on the Olivetti Research Laboratory ( ORL) face database, showing that the extended methods significantly outperform the corresponding standard methods when the number of extracted bits reaches 100. …”
    Get full text