-
1
-
-
35648964955
-
User authenticators: Comparing passwords, tokens and biometrics
-
91, IEEE
-
L. O'Gorman, "User authenticators: Comparing passwords, tokens and biometrics," in Proceedings of the IEEE, 2 91, IEEE, 2003.
-
(2003)
Proceedings of the IEEE
-
-
O'Gorman, L.1
-
6
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), pp. 609-612, 2005.
-
(2005)
IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
7
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal 40(3), pp. 614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
8
-
-
33947529940
-
Cancelable biometrics: A case study in fingerprints
-
N. Ratha, J. Connell, R. Bolle, and S. Chikkerur, "Cancelable biometrics: A case study in fingerprints," in 18th International Conference on Pattern Recognition, ICPR 2006, 4, 2006.
-
(2006)
18th International Conference on Pattern Recognition, ICPR 2006
, vol.4
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
Chikkerur, S.4
-
9
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Eurocrypt, Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Eurocrypt, LNCS 3027, pp. 523-540, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
10
-
-
34548066409
-
Hiding secret points amidst chaff
-
E.-C. Chang and Q. Li, "Hiding secret points amidst chaff," in Eurocrypt 2006, 2006.
-
(2006)
Eurocrypt 2006
-
-
Chang, E.-C.1
Li, Q.2
-
11
-
-
26444448320
-
Cancelable key-based fingerprint templates
-
R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable key-based fingerprint templates," in Lecture Notes in Computer Science, LNCS, 2005.
-
(2005)
Lecture Notes in Computer Science, LNCS
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
12
-
-
27244453175
-
Symmetric hash functions for fingerprint minutiae
-
S. Tulyakov, F. Farooq, and V. Govindaraju, "Symmetric hash functions for fingerprint minutiae," in Lecture Notes in Computer Science, LNCS, 2005.
-
(2005)
Lecture Notes in Computer Science, LNCS
-
-
Tulyakov, S.1
Farooq, F.2
Govindaraju, V.3
-
13
-
-
78149482494
-
Biohashing: Two factor authentication featuring fingerprint data and tokenized random number
-
A. B. Teoh, D. C. Ngo, and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenized random number," Pattern Recognition Letters 37, 2004.
-
(2004)
Pattern Recognition Letters
, vol.37
-
-
Teoh, A.B.1
Ngo, D.C.2
Goh, A.3
-
14
-
-
33646095185
-
An analysis of biohashing and its variants
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of biohashing and its variants," Pattern Recognition 39(7), 2006.
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
15
-
-
33744964477
-
Revealing the secret of facehashing
-
K.-H. Cheung, A. Kong, D. Zhang, M. Kamel, and J. You, "Revealing the secret of facehashing," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3832(7), 2006.
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3832
, Issue.7
-
-
Cheung, K.-H.1
Kong, A.2
Zhang, D.3
Kamel, M.4
You, J.5
|