Microprocessor smart cards with fingerprint user authentication
R Sanchez-Reillo, C Sanchez-Avila… - … . 36th Annual 2002 …, 2002 - ieeexplore.ieee.org
Due to the great increase in information technology systems where user authentication is
needed, security relies on using PINs or passwords. The scientific community is trying to …
needed, security relies on using PINs or passwords. The scientific community is trying to …
Fingerprint verification using smart cards for access control systems
R Sanchez-Reillo… - IEEE aerospace and …, 2002 - ieeexplore.ieee.org
Over the past few years, the authors have tried to integrate biometrics into a smart card. In
this paper, to improve error rates obtained with hand geometry biometrics and the costs with …
this paper, to improve error rates obtained with hand geometry biometrics and the costs with …
Trustbox: A security architecture for preventing data breaches
M Schmidt, S Fahl, R Schwarzkopf… - … on Parallel, Distributed …, 2011 - ieeexplore.ieee.org
In this paper, a novel approach to prevent accidental or deliberate data breaches is
presented. The proposed approach provides platform, network and offline security. Data is …
presented. The proposed approach provides platform, network and offline security. Data is …
On design and optimization of face verification systems that are smart-card based
The optimization of a smart card face verification system is a very complex process with
many key factors to consider. It involves the investigation of the effect the system parameters …
many key factors to consider. It involves the investigation of the effect the system parameters …
Including biometric authentication in a smart card operating system
R Sanchez-Reillo - Audio-and Video-Based Biometric Person …, 2001 - Springer
One of the most secure medias in where to store personal a sensible data, are smart cards.
They can provide security through cryptography and secret keys. Unfortunately, they suffer a …
They can provide security through cryptography and secret keys. Unfortunately, they suffer a …
Achieving security in Integrated Circuit Card applications: reality or desire?
R Sanchez-Reillo - Proceedings IEEE 35th Annual 2001 …, 2001 - ieeexplore.ieee.org
It has been always claimed that smart cards provide a really high level of security,
considering them as tamper-proof devices, with the possibility to auto-block some or all of …
considering them as tamper-proof devices, with the possibility to auto-block some or all of …
Architectures for biometric match-on-token solutions
R Sanchez-Reillo, J Liu-Jimenez, L Entrena - … Authentication: ECCV 2004 …, 2004 - Springer
Abstract Biometric Authentication Systems face several problems related to the security and
the users' potential rejection. Most of those problems comes from the high sensitivity of …
the users' potential rejection. Most of those problems comes from the high sensitivity of …
Improving security in information technology using cryptographic hardware modules
R Sanchez-Reillo, C Sanchez-Avila… - … . 36th Annual 2002 …, 2002 - ieeexplore.ieee.org
It is widely known that information technology applications should be secured. During the
last years, special efforts have been applied to achieve a great level of security. These …
last years, special efforts have been applied to achieve a great level of security. These …
Smartcards.
KM Shelfer, C Corum, JD Procaccino, J Didier - Adv. Comput., 2004 - books.google.com
This paper presents an overview of the history, commercialization, technology, standards,
and current and future applications of smart cards. Section 1 is an overview of smart cards …
and current and future applications of smart cards. Section 1 is an overview of smart cards …
[PDF][PDF] Iris detection based on principal component analysis-eigen irises
D Theckedath - SPITIEEE Colloquium and international Conference, 2007 - etrx.spit.ac.in
This paper describes the technique of personal verification and identification using Iris
Patterns. It detects Irises based on the principal Component technique analysis. The …
Patterns. It detects Irises based on the principal Component technique analysis. The …