Search Results

There are 13193 results for: content related to: BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication

  1. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 727–739, Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Version of Record online : 3 JUL 2014, DOI: 10.1002/sec.1020

  2. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  3. Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4123–4135, Mehmet Sabir Kiraz, Ziya Alper Genc and Suleyman Kardas

    Version of Record online : 21 AUG 2015, DOI: 10.1002/sec.1329

  4. An enhanced user authentication solution for mobile payment systems using wearables

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4639–4649, Kok-Seng Wong and Myung Ho Kim

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1654

  5. Argument on biometrics identity-based encryption schemes

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1344–1352, Syh-Yuan Tan, Zhe Jin and Andrew Beng Jin Teoh

    Version of Record online : 12 FEB 2013, DOI: 10.1002/sec.716

  6. Protect biometric data with compound chaotic encryption

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1928–1943, Charles Z. Liew, Raymond Shaw and Lanlan Li

    Version of Record online : 15 AUG 2014, DOI: 10.1002/sec.1070

  7. Remote three-factor authentication scheme based on Fuzzy extractors

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 682–693, Min Zhang, Jiashu Zhang and Ying Zhang

    Version of Record online : 5 MAY 2014, DOI: 10.1002/sec.1016

  8. Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 37–61, Ann Cavoukian, Michelle Chibba and Alex Stoianov

    Version of Record online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00537.x

  9. Biometric watermarks based on face recognition methods for authentication of digital images

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1672–1687, Wioletta Wójtowicz and Marek R. Ogiela

    Version of Record online : 14 OCT 2014, DOI: 10.1002/sec.1114

  10. Biometric key-binding using lattice masking

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3405–3414, Masaya Yasuda and Yuka Sugimura

    Version of Record online : 1 MAY 2015, DOI: 10.1002/sec.1267

  11. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  12. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1860–1871, Lu Leng, Andrew Beng Jin Teoh, Ming Li and Muhammad Khurram Khan

    Version of Record online : 12 NOV 2013, DOI: 10.1002/sec.900

  13. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  14. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3383–3404, Dheerendra Mishra, Ashok Kumar Das and Sourav Mukhopadhyay

    Version of Record online : 11 MAY 2015, DOI: 10.1002/sec.1266

    Corrected by:

    Erratum: An anonymous and secure biometric-based enterprise digital rights management system for mobile environment

    Vol. 9, Issue 16, 3762, Version of Record online: 18 AUG 2016

  15. Robust three-factor remote user authentication scheme with key agreement for multimedia systems

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1916–1927, Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao and Xiaoke Zhao

    Version of Record online : 5 MAR 2014, DOI: 10.1002/sec.961

  16. Provably secure biometric-based user authentication and key agreement scheme in cloud computing

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4103–4119, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 9 SEP 2016, DOI: 10.1002/sec.1591

  17. The Emergence of Biometrics and Its Effect on Consumers

    Journal of Consumer Affairs

    Volume 39, Issue 2, Winter 2006, Pages: 314–338, JEFF LANGENDERFER and STEFAN LINNHOFF

    Version of Record online : 1 SEP 2005, DOI: 10.1111/j.1745-6606.2005.00017.x

  18. Biometrics

    Standard Article

    Wiley Encyclopedia of Biomedical Engineering

    Ting Ma, Yan Zhang and Yuang-Ting Zhang

    Published Online : 14 APR 2006, DOI: 10.1002/9780471740360.ebs0164

  19. BODY, BIOMETRICS AND IDENTITY

    Bioethics

    Volume 22, Issue 9, November 2008, Pages: 488–498, EMILIO MORDINI and SONIA MASSARI

    Version of Record online : 14 OCT 2008, DOI: 10.1111/j.1467-8519.2008.00700.x

  20. Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques

    Review of Policy Research

    Volume 29, Issue 1, January 2012, Pages: 63–89, Harry Wechsler

    Version of Record online : 19 JAN 2012, DOI: 10.1111/j.1541-1338.2011.00538.x