-
1
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Oakland, CA, May
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in IEEE Symp. Secur. Priv., Oakland, CA, May 1998, pp. 148-157.
-
(1998)
IEEE Symp. Secur. Priv
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
2
-
-
0036350106
-
A fuzzy vault scheme
-
Lausanne, Switzerland, Jul
-
A. Juels and M. Sudan, "A fuzzy vault scheme," in IEEE Int. Symp. Inform. Theory, Lausanne, Switzerland, Jul 2002, p. 408.
-
(2002)
IEEE Int. Symp. Inform. Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
3
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Berkeley, CA
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in ACM SIGMM Work. Biom. Meth. Apps., Berkeley, CA, 2003, pp. 45-52.
-
(2003)
ACM SIGMM Work. Biom. Meth. Apps
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
4
-
-
21644442033
-
Secure fuzzy vault based fingerprint verification system
-
Monterey, CA, Nov
-
S. Yang and I. M. Verbauwhede, "Secure fuzzy vault based fingerprint verification system," in Asilomar Conf., Monterey, CA, Nov 2004, pp. 577-581.
-
(2004)
Asilomar Conf
, pp. 577-581
-
-
Yang, S.1
Verbauwhede, I.M.2
-
5
-
-
26444497730
-
Fuzzy fingerprint vault
-
Cambridge, UK, Aug
-
U. Uludag and A.K. Jain, "Fuzzy fingerprint vault," in Workhop: Biometrics: Challenges Arising from Theory to Practice, Cambridge, UK, Aug 2004, pp. 13-16.
-
(2004)
Workhop: Biometrics: Challenges Arising from Theory to Practice
, pp. 13-16
-
-
Uludag, U.1
Jain, A.K.2
-
6
-
-
0027629488
-
Common randomness in information theory and cryptography I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography I: Secret sharing," IEEE Trans. Inform. Theory, pp. 1121-1132, Jul 1993.
-
(1993)
IEEE Trans. Inform. Theory
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
7
-
-
0015648934
-
Noiseless coding of correlated information sources
-
Jul
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, pp. 471-480, Jul 1973.
-
(1973)
IEEE Trans. Inform. Theory
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
8
-
-
84962074661
-
Secure biometrics via syndromes
-
Monticello, IL, Sep
-
E. Martinian, S. Yekhanin, and J. S. Yedidia, "Secure biometrics via syndromes," in Allerton Conf, Monticello, IL, Sep 2005.
-
(2005)
Allerton Conf
-
-
Martinian, E.1
Yekhanin, S.2
Yedidia, J.S.3
-
9
-
-
52349091161
-
Secure storage of fingerprint biometrics using Slepian-Wolf codes
-
San Diego, CA, Jan
-
S. C. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, "Secure storage of fingerprint biometrics using Slepian-Wolf codes," in Inform. Theory and Apps. Work, UCSD, San Diego, CA, Jan 2007.
-
(2007)
Inform. Theory and Apps. Work, UCSD
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
10
-
-
0035246564
-
Factor graphs and the sum-product algorithm
-
Feb
-
F. R. Kschischang, B. J. Frey, and H. Loeliger, "Factor graphs and the sum-product algorithm," IEEE Trans. Inform. Theory, pp. 498-519, Feb 2001.
-
(2001)
IEEE Trans. Inform. Theory
, pp. 498-519
-
-
Kschischang, F.R.1
Frey, B.J.2
Loeliger, H.3
|