Biometric Digital Signature Key Generation
- Biometric Signature Pad
- Biometric Digital Signature Key Generation Software
- Biometric Digital Signature Key Generation And Cryptography Communication Based On Fingerprint
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my AlertsPlease log in to your account
Save to Binder
Create a New Binder
- 1.Biometrics Consortium homepage; www.biometrics.org.Google Scholar
- 2.Chellappa, R., Wilson, C., and Sirohey, A. Human and machine recognition of faces: A survey. In Proceedings of the IEEE 83, 5 (1995) 705-740.Google ScholarCross Ref
- 3.Daugman, J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. and Machine Intell. 15, 11 (1993)1148-1161. Google ScholarDigital Library
- 4.Furui, S. Recent advances in speaker recognition. Pattern Recognition Letters 18 (1997) 859-872.Google ScholarCross Ref
- 5.Jain, A.K. Bolle, R. and Pankanti S. (eds.). Biometrics: Personal Identification in Networked Society. Kluwer, New York, 1999. Google ScholarDigital Library
- 6.Jain, A.K., Hong, L., Pankanti, S., and Bolle, R. An identityauthentication system using fingerprints. In Proceedings of the IEEE 85, 9 (1997), 1365-1388. Google ScholarDigital Library
- 7.Nalwa, V. Automatic on-line signature verification. In Proceedings of the IEEE 85, 2 (1997), 213-239.Google ScholarCross Ref
- 8.Miller, B. Vital signs of identity. IEEE Spectrum 31, 2 (1994), 22-30. Google ScholarDigital Library
- 9.Sidlauskas, D.R. 3D hand profile identification apparatus. U.S. Patent No. 4736203, 1988.Google Scholar
- 10.Hill, R.B. Apparatus and method for identifying individuals through their retinal vasculature patterns. US Patent No. 4109237, 1978.Google Scholar
- 11.Prokoski, F.K. Disguise detection and identification using infrared imagery. In the Proceedings of SPIE, Optics, and Images in Law Enforcement II. A.S. Hecht, Ed. (Arlington, VA, May, 1982), 27-31.Google Scholar
- 12.Wayman, J.L. Error Rate Equations for the General Biometric System. IEEE Robotics & Automation 6, 9 (Jan. 1999), 35-48.Google Scholar
Biometric identification
Biometric Key Generation In Digital Signature Of Asymmetric Key Cryptographic To Enhance Security Of Digital Data Kamini H Solanki,Chandni Patel Abstract — Associating an identity with an individual is called personal identification.
Login options
- Generating digital signatures using biometrics (from a practical perspective) by exploiting the existing tools in software that can release a human being from hardware devices storing a signing key or a biometric template. The digital signature should be generated in the way that it can be verified by the existing.
- Oct 17, 2014 This means that signing a document can use a simple signature acquisition workflow which obviates the need for the user to remember a PIN and is more secure. Simple to use, everyone has one, and very secure. Biometric signatures combined with existing electronic signature technology is a perfect combination.
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
Biometric Signature Pad
Published in
EISSN:1557-7317Issue’s Table of ContentsCopyright © 2000 ACM
In-Cooperation
Publisher
Association for Computing Machinery
On your ubuntu host:service ssh status Start sshd if necessarymkdir /.ssh/ (if it doesn't already exist)4. On your Windows host via cmder:cd C:UsersyourUserNamescp authorizedkeys login-id@ubuntu-Host-Ip:/.ssh5. On your Ubuntu host:chmod 700 /.sshchmod 600 /.ssh/authorizedkeys6. Generate ssh public key windows 10.
New York, NY, United States
Publication History
Permissions
Request permissions about this article.
Request PermissionsConference
Article Metrics
- Total CitationsView Citations
- Total Downloads
- Downloads (Last 12 months)395
- Downloads (Last 6 weeks)163
Other Metrics
Biometric Digital Signature Key Generation Software
PDF Format
eReader
Digital Edition
View this article in digital edition. Centos generate new ssh key.
View Digital EditionHTML Format
View this article in HTML Format .
View HTML FormatBiometric Digital Signature Key Generation And Cryptography Communication Based On Fingerprint
- Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)zbMATHCrossRefGoogle Scholar
- Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203–213 (1999)zbMATHGoogle Scholar
- ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory IT-30(4), 469–472 (1985)CrossRefGoogle Scholar
- Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/fuzzy_vault.pdf
- Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp.287-291, pp.312-315. CRC Press, Boca Raton, USA (1997)zbMATHGoogle Scholar
- Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158–170. Springer, Heidelberg (2004)Google Scholar
- Nagpal, R., Nagpal, S.: Biometric based digital signature scheme. Internet-Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)Google Scholar
- Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the Security and Privacy, IEEE Computer Society Press, Los Alamitos (1998)Google Scholar
- Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147–163. Springer, Heidelberg (2005)Google Scholar
- Soutar, C.: Biometric system performance and security (2002), Manuscript available at http://www.bioscrypt.com/assets/biopaper.pdf
- Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)Google Scholar
- Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Man-agement & Computer Security 9(5), 205–212 (2001)CrossRefGoogle Scholar
- Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)Google Scholar
- Orvos, P.: Towards biometric digital signatures. Networkshop, pp. 26–28. Eszterhazy College, Eger (March 2002)Google Scholar