The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cancelable biometrics has become an indispensable technique during biometric authentication. There have been several prior attempts to construct cancelable fingerprint templates. However, existing schemes have not provided a satisfying trade off between performance and security. In this paper, we proposed two novel approaches to construct registration-free cancelable fingerprint templates based on...
Because the speed degradation and on-chip resources limit large CAM applications on SoCs and FPGAs, Hash-CAM architectures are attractive concepts combining the space efficiency of hashing algorithm and fast lookup character of the CAM for collision resolutions. In proposed Hash-CAM circuit, single and double hashing schemes are explored and compared. It proves that, with parallel CRC circuit and...
The biometric template, which is stored in the form of raw data, has become the greatest potential threat to the security of biometric authentication system. As the compromise of the biometric data is permanent, the protection of biometric data is particularly important. Consequently, biometric template protection technologies have aroused research highlights recently. One of the most popular template...
In this paper, a global chaos synchronization scheme of three identical systems is investigated. By choosing proper coupling parameters, the states of all the three systems can be synchronized. Then this method was applied to secure communication through chaotic masking, used three coupled identical systems, propose a novel method of chaos encryption, after encrypting in the previous two transmitters,...
In this paper, a global chaos synchronization scheme of three identical systems is investigated. By choosing proper coupling parameters, the states of all the three systems can be synchronized. Then this method was applied to secure communication through chaotic masking, used three coupled identical systems, propose a novel method of chaos encryption, after encrypting in the previous two transmitters,...
Motivated by the demand of databases outsourcing and its security concerns, privacy-preserving set operations have been a research hotspot in distributed scenario. By combining Shamir secret sharing scheme and homomorphic encryption, we propose a protocol for privacy-preserving set pattern matching, this protocol constructed in this paper is provably secure against a semi-honest adversary under the...
Because of the randomness of biometric features, traditional methods cannot perform well in the encryption of fingerprint template. The Fuzzy Vault construct is a biometric cryptosystem which can bind the fingerprint features with the secret key, and give reliable protection to both of them. The performance of Fuzzy Vault is highly affected by the alignment of fingerprints in the encryption field...
In the current Internet, hosts are identified using IP addresses that depend on the topological location of the hosts. In other words, the IP addresses are semantically overloaded since they identify both hosts and topological locations. The host identity protocol (HIP) introduces a way of separating the location and host identity information. It introduces a new namespace, cryptographic in nature,...
Information becomes more and more important than any time. Now we are living in a data era with development of computer technology. The encryptions were accepted as the most important way to keep the data safe. In this paper, the traditional one-time-key encryption algorithm is given new meaning, and combined with chaotic algorithm become a new encryption. Then the realization of software and hardware...
Hierarchical ID-based signature (HIBS) scheme is a generalization of identity based signature. It allows a root PKG to generate private keys for domain-level PKGs, who in turn generate private keys for their users in the domains of the lower level. A practical hierarchical identity based signature scheme (HIBS) based on bilinear parings is proposed. Assuming the intractability of the computational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.