Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Biometric data in security systems with restricted resources - authentication and protection.

2014/15/N/ST6/04375

Keywords:

biometry security algorithms authentication wireless comunication smart card RFID

Descriptors:

  • ST6_5: Cryptography, security, privacy, quantum computing
  • ST6_2: Computer systems, parallel/distributed systems, sensor networks, embedded systems, cyber-physical systems
  • ST6_6: Algorithms, parallel, distributed and network algorithms, algorithmic game theory

Panel:

ST6 - Computer science and informatics: informatics and information systems, computer science, scientific computing, intelligent systems

Host institution :

Politechnika Wrocławska, Wydział Podstawowych Problemów Techniki

woj. dolnośląskie

Other projects carried out by the institution 

Principal investigator (from the host institution):

Wojciech Wodo 

Number of co-investigators in the project: 3

Call: PRELUDIUM 8 - announced on 2014-09-15

Amount awarded: 65 280 PLN

Project start date (Y-m-d): 2015-08-04

Project end date (Y-m-d): 2017-02-03

Project duration:: 18 months (the same as in the proposal)

Project status: Project settled

Information in the final report

  • Articles in post-conference publications (3)
  1. Computations on Private Sets and their Application to Biometric based Authentication Systems
    Authors:
    Wojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak
    Conference:
    International Conference on Security and Cryptography: SECRYPT (rok: 2016, ), Wydawca: SCITEPRESS
    Data:
    konferencja 26-28.07.2016
    Status:
    Published
  2. Biometrics safety engineering in mobile devices
    Authors:
    Wojciech Wodo, Lucjan Hanzlik
    Conference:
    Future Technologies Conference (FTC) (rok: 2016, ), Wydawca: IEEE
    Data:
    konferencja 06-07.12.2016
    Status:
    Published
  3. Thermal Imaging Attacks on Keypad Security Systems
    Authors:
    Wojciech Wodo, Lucjan Hanzlik
    Conference:
    International Conference on Security and Cryptography: SECRYPT (rok: 2016, ), Wydawca: SCITEPRESS
    Data:
    konferencja 26-28.07.2016
    Status:
    Published