-
1
-
-
33746049783
-
Hiding secret points amidst chaff
-
EUROCRYPT, St. Petersburg, Russia, May
-
Ee-Chien Chang and Qiming Li. Hiding secret points amidst chaff. In EUROCRYPT, volume 4004 of LNCS, pages 59-72, St. Petersburg, Russia, May 2006.
-
(2006)
LNCS
, vol.4004
, pp. 59-72
-
-
Chang, E.-C.1
Li, Q.2
-
2
-
-
0035333687
-
Quantization Index Modulation methods: A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G.W. Wornell. Quantization Index Modulation methods: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory, 49 (4): 1423-1443, 2001.
-
(2001)
IEEE Trans. on Information Theory
, vol.49
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
3
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Berkley, California
-
T.C. Clancy, N. Kiyavash, and D.J. Lin. Secure smartcard-based fingerprint authentication. In ACM Workshop on Biometric Methods and Applications, pages 45-52, Berkley, California, 2003.
-
(2003)
ACM Workshop on Biometric Methods and Applications
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
4
-
-
33750901987
-
A formal security analysis of approximate message authentication codes
-
College Park, MD, April
-
G. Di Crescenzo, R. Graveman, G. Arce, and R. Ge. A formal security analysis of approximate message authentication codes. In CTA Communications and Networks, pages 217-221, College Park, MD, April 2003.
-
(2003)
CTA Communications and Networks
, pp. 217-221
-
-
Di Crescenzo, G.1
Graveman, R.2
Arce, G.3
Ge, R.4
-
5
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Eurocypt, Interlaken, Switzerland, May
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocypt, volume 3027 of LNCS, pages 125-132, Interlaken, Switzerland, May 2004.
-
(2004)
LNCS
, vol.3027
, pp. 125-132
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
6
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
IFIP Communications and Multimedia Security, Torino, Italy, October
-
A. Goh and D.C.L. Ngo. Computation of cryptographic keys from face biometrics. In IFIP Communications and Multimedia Security, volume 2828 of LNCS, pages 1-13, Torino, Italy, October 2003.
-
(2003)
LNCS
, vol.2828
, pp. 1-13
-
-
Goh, A.1
Ngo, D.C.L.2
-
8
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
F. Hao and C.W. Chan. Private key generation from on-line handwritten signatures. Information Management and Computer Security, 10(4): 159-164, 2002.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
12
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
4th International Conference on Audio and Video Based Biometric Person Authentication, June
-
J. P. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In 4th International Conference on Audio and Video Based Biometric Person Authentication, volume 2688 of LNCS, pages 125-132, June 2003.
-
(2003)
LNCS
, vol.2688
, pp. 125-132
-
-
Linnartz, J.P.1
Tuyls, P.2
-
13
-
-
0034829626
-
Cryptographic key generation from voice
-
Oakland, CA, May
-
F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel. Cryptographic key generation from voice. In IEEE Symposium on Security and Privacy, pages 202-213, Oakland, CA, May 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
14
-
-
33748076787
-
A secure biometric authentication scheme based on robust hashing
-
New York City, NY, August
-
Y. Sutcu, T. Sencar, and N. Memon. A secure biometric authentication scheme based on robust hashing. In A CM Multimedia Security Workshop, pages 111-116, New York City, NY, August 2005.
-
(2005)
A CM Multimedia Security Workshop
, pp. 111-116
-
-
Sutcu, Y.1
Sencar, T.2
Memon, N.3
-
15
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
Prague, May
-
P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems. In Biometric Authentication Workshop, pages 158-170, Prague, May 2004.
-
(2004)
Biometric Authentication Workshop
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
16
-
-
0035362493
-
Approximate image message authentication codes
-
L. Xie, G.R. Arce, and R.F. Graveman. Approximate image message authentication codes. IEEE Trans. on Multimedia, 3(2):242-252, 2001.
-
(2001)
IEEE Trans. on Multimedia
, vol.3
, Issue.2
, pp. 242-252
-
-
Xie, L.1
Arce, G.R.2
Graveman, R.F.3
|