메뉴 건너뛰기




Volumn 6202, Issue , 2006, Pages

Secret sharing using biometrie traits

Author keywords

Biometrics; Cryptography; Fuzzy; Key; Privacy; Sharing; Vault

Indexed keywords

COPYRIGHTS; CRYPTOGRAPHY; DATA PRIVACY; SECURITY OF DATA;

EID: 33747661750     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.666146     Document Type: Conference Paper
Times cited : (7)

References (11)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret." Communications of the ACM 22, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 4
    • 0010073906 scopus 로고    scopus 로고
    • On enabling secure applications through on-line biometric identification
    • G. Davida, Y. Frankel, and B. Matt. "On enabling secure applications through on-line biometric identification," In IEEE Symposium on Privacy and Security, p. 408, 1998.
    • (1998) IEEE Symposium on Privacy and Security , pp. 408
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 6
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • J. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," Proceeding of AVBPA (LNCS 2688), pp. 393-402, 2003.
    • (2003) Proceeding of AVBPA (LNCS) , vol.2688 , pp. 393-402
    • Linnartz, J.1    Tuyls, P.2
  • 8
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • H. Feng and C. Wah, "Private key generation from on-line handwritten signatures." Information Management & Computer Security, 10/4, pp. 159-164, 2002.
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Feng, H.1    Wah, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.