Microprocessor smart cards with fingerprint user authentication

R Sanchez-Reillo, C Sanchez-Avila… - … . 36th Annual 2002 …, 2002 - ieeexplore.ieee.org
Due to the great increase in information technology systems where user authentication is
needed, security relies on using PINs or passwords. The scientific community is trying to …

Fingerprint verification using smart cards for access control systems

R Sanchez-Reillo… - IEEE aerospace and …, 2002 - ieeexplore.ieee.org
Over the past few years, the authors have tried to integrate biometrics into a smart card. In
this paper, to improve error rates obtained with hand geometry biometrics and the costs with …

Trustbox: A security architecture for preventing data breaches

M Schmidt, S Fahl, R Schwarzkopf… - … on Parallel, Distributed …, 2011 - ieeexplore.ieee.org
In this paper, a novel approach to prevent accidental or deliberate data breaches is
presented. The proposed approach provides platform, network and offline security. Data is …

On design and optimization of face verification systems that are smart-card based

T Bourlai, J Kittler, K Messer - Machine Vision and Applications, 2010 - Springer
The optimization of a smart card face verification system is a very complex process with
many key factors to consider. It involves the investigation of the effect the system parameters …

Including biometric authentication in a smart card operating system

R Sanchez-Reillo - Audio-and Video-Based Biometric Person …, 2001 - Springer
One of the most secure medias in where to store personal a sensible data, are smart cards.
They can provide security through cryptography and secret keys. Unfortunately, they suffer a …

Achieving security in Integrated Circuit Card applications: reality or desire?

R Sanchez-Reillo - Proceedings IEEE 35th Annual 2001 …, 2001 - ieeexplore.ieee.org
It has been always claimed that smart cards provide a really high level of security,
considering them as tamper-proof devices, with the possibility to auto-block some or all of …

Architectures for biometric match-on-token solutions

R Sanchez-Reillo, J Liu-Jimenez, L Entrena - … Authentication: ECCV 2004 …, 2004 - Springer
Abstract Biometric Authentication Systems face several problems related to the security and
the users' potential rejection. Most of those problems comes from the high sensitivity of …

Improving security in information technology using cryptographic hardware modules

R Sanchez-Reillo, C Sanchez-Avila… - … . 36th Annual 2002 …, 2002 - ieeexplore.ieee.org
It is widely known that information technology applications should be secured. During the
last years, special efforts have been applied to achieve a great level of security. These …

Smartcards.

KM Shelfer, C Corum, JD Procaccino, J Didier - Adv. Comput., 2004 - books.google.com
This paper presents an overview of the history, commercialization, technology, standards,
and current and future applications of smart cards. Section 1 is an overview of smart cards …

[PDF][PDF] Iris detection based on principal component analysis-eigen irises

D Theckedath - SPITIEEE Colloquium and international Conference, 2007 - etrx.spit.ac.in
This paper describes the technique of personal verification and identification using Iris
Patterns. It detects Irises based on the principal Component technique analysis. The …