-
1
-
-
84860946243
-
-
IDG News Service. (February 14). [Online]
-
US global piracy losses estimated at $9.2B in 2002, IDG News Service. (2003, February 14). [Online]. Available: http://www.computerworld.com/ securitytopics/security/cybercrirne/story/0,10801,78545,00.html
-
(2003)
US Global Piracy Losses Estimated at $9.2B in 2002
-
-
-
2
-
-
84860940336
-
-
Business Software Alliance. (June 10). [Online]
-
Four out of every ten software programs are pirated world-wide. Business Software Alliance. (2002, June 10). [Online]. Available: http://global.bsa.org/ usa/press/newsreleases//2002-06-10.1129.phtml
-
(2002)
Four out of Every Ten Software Programs are Pirated World-wide
-
-
-
3
-
-
0003508558
-
-
Federal information processing standards publication 197, National Institute of Standards and Technology. [Online]
-
Advanced encryption standard (AES). Federal information processing standards publication 197, National Institute of Standards and Technology. (2001). [Online]. Available: http://csrc.nisi.gov/publications/fips/fips197/ fips-197.pdf
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
5
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. V. Klein. "Foiling the cracker: a survey of, and improvements to, password security," in Proc. 2nd USENIX Workshop Security, 1990, pp. 5-14.
-
(1990)
Proc. 2nd USENIX Workshop Security
, pp. 5-14
-
-
Klein, D.V.1
-
6
-
-
21244456672
-
Passwords exposed: Users are the weakest link
-
June. [Online]
-
I. Armstrong. (2003, June) Passwords exposed: Users are the weakest link. SC Mag. [Online], Available: http:/www.scmagazine.com/features/index.cfm? fuseaction=FeatureDetails&newsUID=43b97d8d-3605-4a18-b9bc- 03c063008dc8&newsType=Features
-
(2003)
SC Mag.
-
-
Armstrong, I.1
-
7
-
-
0003987134
-
-
Norwell, MA: Kluwer
-
A. K. Jain, R. Bolle, and S. Pankanti, Eds., Biometrics: Personal Identification in Networked Society. Norwell, MA: Kluwer, 1999.
-
(1999)
Biometrics: Personal Identification in Networked Society
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
-
9
-
-
0742302033
-
Fundamentals of biometric authentication technologies
-
J. L. Wayman, "Fundamentals of biometric authentication technologies," Int. J. Image Graph., vol. 1, no. 1, pp. 93-113, 2001.
-
(2001)
Int. J. Image Graph.
, vol.1
, Issue.1
, pp. 93-113
-
-
Wayman, J.L.1
-
11
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
12
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. K. Vijaya Kumar, "Biometric encryption using image processing," in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, 1998, pp. 178-188.
-
(1998)
Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
13
-
-
19444368925
-
Biometric encryption - Enrollment and verification procedures
-
_, "Biometric encryption - enrollment and verification procedures," in Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, 1998, pp. 24-35.
-
(1998)
Proc. SPIE, Optical Pattern Recognition IX
, vol.3386
, pp. 24-35
-
-
-
14
-
-
8344236959
-
Biometric encryption
-
R. K. Nichols, Ed. New York: McGraw-Hill
-
_, "Biometric encryption," in ICSA Guide to Cryptography, R. K. Nichols, Ed. New York: McGraw-Hill, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
-
16
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth and E. Teletar, Eds.
-
A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Information Theory, A. Lapidoth and E. Teletar, Eds., 2002, p. 408.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
17
-
-
8844234621
-
On the relation of error correction and cryptography lo an offline biometric based identification scheme
-
G. I. Davida, Y. Frankel, B. J. Malt, and R. Peralta, "On the relation of error correction and cryptography lo an offline biometric based identification scheme," in Proc. Workshop Coding and Cryptography (WCC'99), pp. 129-138.
-
Proc. Workshop Coding and Cryptography (WCC'99)
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Malt, B.J.3
Peralta, R.4
-
18
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Nov.
-
J. G. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Machine Intell., vol. 15, pp. 1148-1161, Nov. 1993.
-
(1993)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.15
, pp. 1148-1161
-
-
Daugman, J.G.1
-
20
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel, "Password hardening based on keystroke dynamics," in Proc. 6th ACM Conf. Computer and Communications Security, 1999, pp. 73-82.
-
(1999)
Proc. 6th ACM Conf. Computer and Communications Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
21
-
-
84894038661
-
Using voice to generate cryptographic keys
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Using voice to generate cryptographic keys," in Proc. 2001: A Speaker Odyssey, Speaker Recognition Workshop, 2001, pp. 237-242.
-
(2001)
Proc. 2001: A Speaker Odyssey, Speaker Recognition Workshop
, pp. 237-242
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
22
-
-
0034829626
-
Cryptographic key generation from voice
-
_, "Cryptographic key generation from voice," in Proc. 2001 IEEE Symp. Security and Privacy, pp. 202-213.
-
Proc. 2001 IEEE Symp. Security and Privacy
, pp. 202-213
-
-
-
23
-
-
85084163045
-
Toward speech-generated cryptographic keys on resource constrained devices
-
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih, "Toward speech-generated cryptographic keys on resource constrained devices," in Proc. 11th USENIX Security Symp., 2002, pp. 283-296.
-
(2002)
Proc. 11th USENIX Security Symp.
, pp. 283-296
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Lopresti, D.P.4
Shih, C.5
-
25
-
-
5044251072
-
Reliable biometric authentication with privacy protection
-
Orlando, FL
-
E. Verbitskiy, P. Tuyls, D. Denteneer, and J. P. Linnartz, "Reliable biometric authentication with privacy protection," presented at the SPIE Biometric Technology for Human Identification Conf., Orlando, FL, 2004.
-
(2004)
SPIE Biometric Technology for Human Identification Conf.
-
-
Verbitskiy, E.1
Tuyls, P.2
Denteneer, D.3
Linnartz, J.P.4
-
26
-
-
0033281339
-
A fuzzy commitment scheme
-
G. Tsudik, Ed.
-
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. 6th ACM Conf. Computer and Communications Security, G. Tsudik, Ed., 1999, pp. 28-36.
-
(1999)
Proc. 6th ACM Conf. Computer and Communications Security
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
27
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45-52.
-
Proc. ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
28
-
-
0036685857
-
On the individuality of fingerprints
-
Aug.
-
S. Pankanti, S. Prabhakar, and A. K. Jain, "On the individuality of fingerprints," IEEE Trans. Pattern Anal. Machine Intell., vol. 24, pp. 1010-1025, Aug. 2002.
-
(2002)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.24
, pp. 1010-1025
-
-
Pankanti, S.1
Prabhakar, S.2
Jain, A.K.3
-
29
-
-
0031233235
-
An identity authentication system using fingerprints
-
Sept.
-
A. K. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identity authentication system using fingerprints," Proc. IEEE, vol. 85, pp. 1365-1388, Sept. 1997.
-
(1997)
Proc. IEEE
, vol.85
, pp. 1365-1388
-
-
Jain, A.K.1
Hong, L.2
Pankanti, S.3
Bolle, R.4
-
30
-
-
33751580079
-
FVC2002: Fingerprint verification competition
-
D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "FVC2002: Fingerprint Verification Competition," in Proc. Int. Conf. Pattern Recognition (ICPR), 2002, pp. 744-747.
-
(2002)
Proc. Int. Conf. Pattern Recognition (ICPR)
, pp. 744-747
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
31
-
-
85024264226
-
Biometrics: Uses and abuses
-
Aug.
-
B. Schneier, "Biometrics: uses and abuses," Commun. ACM, vol. 42, no. 8, p. 136, Aug. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.8
, pp. 136
-
-
Schneier, B.1
|