-
3
-
-
77956781639
-
Biometric yet privacy protecting person authentication
-
Springer-Verlag
-
G. Bleumer. Biometric yet privacy protecting person authentication. In Proceedings of 1998 Information Hiding Workshop (IHW 98), pages 101-112. Springer-Verlag, 1998.
-
(1998)
Proceedings of 1998 Information Hiding Workshop (IHW 98)
, pp. 101-112
-
-
Bleumer, G.1
-
4
-
-
26444574854
-
Offine personal credentials
-
AT&T
-
G. Bleumer. Offine personal credentials. Technical Report TR 98.4.1, AT&T, 1998.
-
(1998)
Technical Report
, vol.TR 98.4.1
-
-
Bleumer, G.1
-
5
-
-
0036887662
-
Biometric perils and patches
-
R. M. Bolle, J. H. Connell, and N. K. Ratha. Biometric perils and patches. Pattern Recognition, 35(12):2727-2738, 2002.
-
(2002)
Pattern Recognition
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, N.K.3
-
6
-
-
85001025766
-
Wallet databases with observers
-
Springer Verlag
-
D. Chaum and T. P. Pedersen. Wallet databases with observers. In Crypto '92, LNCS 740, pages 89-105. Springer Verlag, 1993.
-
(1993)
Crypto '92, LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
8
-
-
54049123956
-
Perfectly secure authorization and passive identification for an error tolerant biometric system
-
G. Davida and Y. Frankel. Perfectly secure authorization and passive identification for an error tolerant biometric system. In Proceedings of 7th Conference on Cryptography and Coding, LNCS 1746, pages 104-113, 1999.
-
(1999)
Proceedings of 7th Conference on Cryptography and Coding, LNCS
, vol.1746
, pp. 104-113
-
-
Davida, G.1
Frankel, Y.2
-
11
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer Verlag
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In EUROCRYPT 2004, LNCS 3027, pages 523-540. Springer Verlag, 2004.
-
(2004)
EUROCRYPT 2004, LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
12
-
-
0038435593
-
Biometrics, access control, smart cards: A not so simple combination
-
Kluwer Academic Publishers, September
-
G. Hachez, F. Koeune, and J.-J. Quisquater. Biometrics, access control, smart cards: A not so simple combination. In Proc. of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), pages 273-288. Kluwer Academic Publishers, September 2000.
-
(2000)
Proc. of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000)
, pp. 273-288
-
-
Hachez, G.1
Koeune, F.2
Quisquater, J.-J.3
-
14
-
-
0031122443
-
On-line fingerprint verification
-
A. Jain, L. Hong, and R. Bolle. On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4):302-314, 1997.
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.4
, pp. 302-314
-
-
Jain, A.1
Hong, L.2
Bolle, R.3
-
19
-
-
0003851399
-
-
John Wiley & Sons, Inc., 2nd edition
-
B. Schneier. Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc., 2nd edition, 1995.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
20
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
ECCV Workshop on Biometric Authentication
-
P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems. In ECCV Workshop on Biometric Authentication, volume 3087 of Lecture Notes in Computer Science, pages 158-170, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3087
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
|