-
1
-
-
10044297649
-
-
SpringerVerlag
-
Ruud Bolle, Jonathan Connell, Sharanthchandra Pankanti, Nalini Ratha, and Andrew Senior. Guide to Biometrics. SpringerVerlag, 2003.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
2
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, ACM
-
Xavier Boyen. Reusable cryptographic fuzzy extractors. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, ACM Conference on Computer and Communications Security, pages 82-91. ACM, 2004.
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Boyen, X.1
-
3
-
-
34748913281
-
Fuzzy extractors for continuous distributions
-
Technical Report TR-CTIT-06-72, Enschede, October
-
I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis. Fuzzy extractors for continuous distributions. Technical Report TR-CTIT-06-72, Enschede, October 2006.
-
(2006)
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
4
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
IEEE
-
Yao-Jen Chang, Wende Zhang, and Tsuhan Chen. Biometrics-based cryptographic key generation. In ICME, pages 2203-2206. IEEE, 2004.
-
(2004)
ICME
, pp. 2203-2206
-
-
Chang, Y.1
Zhang, W.2
Chen, T.3
-
5
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Christian Cachin and Jan Camenisch, editors, EUROCRYPT, of, Springer
-
Yevgeniy Dodis, Leonid Reyzin, and Adam Smith Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 523-540. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
6
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Josef Kittler and Mark S. Nixon, editors, AVBPA, of, Springer
-
Jean-Paul M. G. Linnartz and Pim Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Josef Kittler and Mark S. Nixon, editors, AVBPA, volume 2688 of Lecture Notes in Computer Science, pages 393-402. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2688
, pp. 393-402
-
-
Linnartz, J.M.G.1
Tuyls, P.2
-
7
-
-
0034829626
-
Cryptographic key generation from voice
-
Fabian Monrose, Michael K. Reiter, Qi Li, and Susanne Wetzel. Cryptographic key generation from voice. In IEEE Symposium on Security and Privacy, pages 202-213, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
8
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
L. O'Gorman. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12):2021-2040, 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
9
-
-
26444507172
-
Practical, biometric authentication with template protection
-
Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, of, Springer
-
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. Practical, biometric authentication with template protection. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Jan Schrijen, G.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
10
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, of, Springer
-
Umut Uludag, Sharath Pankanti, and Anil K. Jain. Fuzzy vault for fingerprints. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 310-319. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
11
-
-
20444496565
-
Optimal thresholding for key generation based on biometrics
-
Wende Zhang, Yao-Jen Chang, and Tsuhan Chen. Optimal thresholding for key generation based on biometrics. In ICIP, pages 3451-3454, 2004.
-
(2004)
ICIP
, pp. 3451-3454
-
-
Zhang, W.1
Chang, Y.2
Chen, T.3
|