메뉴 건너뛰기




Volumn , Issue , 2007, Pages 353-355

Fuzzy extractors for continuous distributions

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRICS; CRYPTOGRAPHY; ERROR ANALYSIS; INFORMATION SYSTEMS; MATHEMATICAL MODELS;

EID: 34748924251     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1229285.1229325     Document Type: Conference Paper
Times cited : (60)

References (11)
  • 2
    • 14844335721 scopus 로고    scopus 로고
    • Reusable cryptographic fuzzy extractors
    • Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, ACM
    • Xavier Boyen. Reusable cryptographic fuzzy extractors. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, ACM Conference on Computer and Communications Security, pages 82-91. ACM, 2004.
    • (2004) ACM Conference on Computer and Communications Security , pp. 82-91
    • Boyen, X.1
  • 3
    • 34748913281 scopus 로고    scopus 로고
    • Fuzzy extractors for continuous distributions
    • Technical Report TR-CTIT-06-72, Enschede, October
    • I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis. Fuzzy extractors for continuous distributions. Technical Report TR-CTIT-06-72, Enschede, October 2006.
    • (2006)
    • Buhan, I.R.1    Doumen, J.M.2    Hartel, P.H.3    Veldhuis, R.N.J.4
  • 4
    • 11244340682 scopus 로고    scopus 로고
    • Biometrics-based cryptographic key generation
    • IEEE
    • Yao-Jen Chang, Wende Zhang, and Tsuhan Chen. Biometrics-based cryptographic key generation. In ICME, pages 2203-2206. IEEE, 2004.
    • (2004) ICME , pp. 2203-2206
    • Chang, Y.1    Zhang, W.2    Chen, T.3
  • 5
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Christian Cachin and Jan Camenisch, editors, EUROCRYPT, of, Springer
    • Yevgeniy Dodis, Leonid Reyzin, and Adam Smith Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 523-540. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 6
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Josef Kittler and Mark S. Nixon, editors, AVBPA, of, Springer
    • Jean-Paul M. G. Linnartz and Pim Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Josef Kittler and Mark S. Nixon, editors, AVBPA, volume 2688 of Lecture Notes in Computer Science, pages 393-402. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2688 , pp. 393-402
    • Linnartz, J.M.G.1    Tuyls, P.2
  • 8
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • L. O'Gorman. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12):2021-2040, 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 9
    • 26444507172 scopus 로고    scopus 로고
    • Practical, biometric authentication with template protection
    • Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, of, Springer
    • Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. Practical, biometric authentication with template protection. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Jan Schrijen, G.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 10
    • 26444525625 scopus 로고    scopus 로고
    • Fuzzy vault for fingerprints
    • Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, of, Springer
    • Umut Uludag, Sharath Pankanti, and Anil K. Jain. Fuzzy vault for fingerprints. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 310-319. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 310-319
    • Uludag, U.1    Pankanti, S.2    Jain, A.K.3
  • 11
    • 20444496565 scopus 로고    scopus 로고
    • Optimal thresholding for key generation based on biometrics
    • Wende Zhang, Yao-Jen Chang, and Tsuhan Chen. Optimal thresholding for key generation based on biometrics. In ICIP, pages 3451-3454, 2004.
    • (2004) ICIP , pp. 3451-3454
    • Zhang, W.1    Chang, Y.2    Chen, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.