-
2
-
-
36348934345
-
-
RSA Laboratories, PKCS #5: Password-Based Cryptography Standard, Version. 2.0 RSA, Mar. 1999, Tech. Rep.
-
RSA Laboratories, PKCS #5: Password-Based Cryptography Standard, Version. 2.0 RSA, Mar. 1999, Tech. Rep.
-
-
-
-
4
-
-
0742290133
-
An introduction to biometric recognition
-
Jan
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4-20, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
5
-
-
82055208335
-
An analysis of minutiae matching strength
-
Halmstad, Sweden, Jun
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "An analysis of minutiae matching strength," in Proc. Audio- and Video-Based Biometrie Person Authentication, Halmstad, Sweden, Jun. 2001, pp. 223-228.
-
(2001)
Proc. Audio- and Video-Based Biometrie Person Authentication
, pp. 223-228
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
7
-
-
0036350106
-
A fuzzy vault scheme
-
Lausanne, Switzerland
-
A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Inform. Theory, Lausanne, Switzerland, 2002, p. 408.
-
(2002)
Proc. IEEE Int. Symp. Inform. Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
8
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Oakland, CA, May
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
9
-
-
8344236959
-
Biometric encrpytion
-
R. K. Nichols, Ed. New York: McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encrpytion," in ICSA Guide Cryptograp., R. K. Nichols, Ed. New York: McGraw-Hill, 1999.
-
(1999)
ICSA Guide Cryptograp
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
10
-
-
0034829626
-
Cryptographic key generation from voice
-
Oakland, CA, May 200.1, pp
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 200.1, pp. 202-213.
-
Proc. IEEE Symp. Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
12
-
-
36348947793
-
Fuzzy extractors: How to generate strong keys from, biometrics and other noisy data
-
Cryptology ePrint Archive, Tech. Rep. 235, Feb
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from, biometrics and other noisy data," Cryptology ePrint Archive, Tech. Rep. 235, Feb. 2006.
-
(2006)
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
33747624401
-
Combining crypto with, biometrics effectively
-
Sep
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with, biometrics effectively," IEEE Trans. Comput., vol. 55, no. 9, pp. 1081-1088, Sep. 2006.
-
(2006)
IEEE Trans. Comput
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
14
-
-
26444507172
-
Practical biometric authentication with template protection
-
Rye Town, NY, Jul
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G.-J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in Proc. AVBPA, Rye Town, NY, Jul. 2005, pp. 436-446.
-
(2005)
Proc. AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
15
-
-
36348979078
-
Secure biometrics via syndromes
-
Mitsubishi Elect. Res. Labs, Tech. Rep. TR2005-112, Dec
-
E. Martinian, S. Yekhanin, and J. Yedidia, "Secure biometrics via syndromes," Mitsubishi Elect. Res. Labs, Tech. Rep. TR2005-112, Dec. 2005.
-
(2005)
-
-
Martinian, E.1
Yekhanin, S.2
Yedidia, J.3
-
16
-
-
0034809453
-
Enhancing security and privacy in biometric authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometric authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
17
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE (Special Issue Multimedia Security for Digital Rights Management), vol. 92, no. 6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE (Special Issue Multimedia Security for Digital Rights Management)
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
19
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Berkley, CA, Nov
-
T. Clancy, D. Lin, and N. Kiyavash, "Secure smartcard-based fingerprint authentication," in Proc. ACM SIGMM Workshop on Biometric Methods and Applications, Berkley, CA, Nov. 2003, pp. 45-52.
-
(2003)
Proc. ACM SIGMM Workshop on Biometric Methods and Applications
, pp. 45-52
-
-
Clancy, T.1
Lin, D.2
Kiyavash, N.3
-
20
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
Philadelphia, PA, Mar
-
S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE ICASSP, Philadelphia, PA, Mar. 2005, vol. 5, pp. 609-612.
-
(2005)
Proc. IEEE ICASSP
, vol.5
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
21
-
-
33744911734
-
Automatic alignment of fingerprint features for fuzzy fingerprint vault
-
Beijing, China, Dec
-
Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, and D. Ahn, "Automatic alignment of fingerprint features for fuzzy fingerprint vault," in Proc. Conf. Information Security Cryptology, Beijing, China, Dec. 2005, pp. 358-369.
-
(2005)
Proc. Conf. Information Security Cryptology
, pp. 358-369
-
-
Chung, Y.1
Moon, D.2
Lee, S.3
Jung, S.4
Kim, T.5
Ahn, D.6
-
22
-
-
33845514726
-
Protecting face biometric data on smartcard with Reed-Solomon code
-
New York, Jun
-
Y. C. Feng and P. C. Yuen, "Protecting face biometric data on smartcard with Reed-Solomon code," in Proc. CVPR Workshop Privacy Research in Vision, New York, Jun. 2006, p. 29.
-
(2006)
Proc. CVPR Workshop Privacy Research in Vision
, pp. 29
-
-
Feng, Y.C.1
Yuen, P.C.2
-
23
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
Orlando, FL, Apr
-
M. Freire-Santos, J. Fierrez-Aguilar, and J. Ortega-Garcia, "Cryptographic key generation using handwritten signature," in Proc. Biometric Technologies for Human Identification III, Orlando, FL, Apr. 2006, vol. 6202, pp. 225-231.
-
(2006)
Proc. Biometric Technologies for Human Identification III
, vol.6202
, pp. 225-231
-
-
Freire-Santos, M.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
-
24
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Rye Town, NY, Jul
-
U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," in Proc. Audio- and Video-Based Biometric Person Authentication, Rye Town, NY, Jul. 2005, pp. 310-319.
-
(2005)
Proc. Audio- and Video-Based Biometric Person Authentication
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
25
-
-
33845532978
-
Securing fingerprint template: Fuzzy vault with helper data
-
New York, Jun
-
U. Uludag and A. K. Jain, "Securing fingerprint template: Fuzzy vault with helper data," in Proc. CVPR Workshop Privacy Research Vision, New York, Jun. 2006, p. 163.
-
(2006)
Proc. CVPR Workshop Privacy Research Vision
, pp. 163
-
-
Uludag, U.1
Jain, A.K.2
-
26
-
-
0031122443
-
On-line fingerprint verification
-
Apr
-
A. K. Jain, L. Hong, and R. Bolle, "On-line fingerprint verification," IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 4, pp. 302-314, Apr. 1997.
-
(1997)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.19
, Issue.4
, pp. 302-314
-
-
Jain, A.K.1
Hong, L.2
Bolle, R.3
-
27
-
-
34247366845
-
Finding the original point set hidden among chaff
-
Taipei, Taiwan, R.O.C
-
E.-C. Chang, R. Shen, and F. W. Teo, "Finding the original point set hidden among chaff," in Proc. ACM Symp. Information, Computer Communications Security, Taipei, Taiwan, R.O.C., 2006, pp. 182-188.
-
(2006)
Proc. ACM Symp. Information, Computer Communications Security
, pp. 182-188
-
-
Chang, E.-C.1
Shen, R.2
Teo, F.W.3
-
28
-
-
26444548001
-
Fingerprint quality indices for predicting authentication performance
-
Rye Brook, NY, Jul
-
Y. Chen, S. C. Dass, and A. K. Jain, "Fingerprint quality indices for predicting authentication performance," in Proc. AVBPA, Rye Brook, NY, Jul. 2005, pp. 160-170.
-
(2005)
Proc. AVBPA
, pp. 160-170
-
-
Chen, Y.1
Dass, S.C.2
Jain, A.K.3
-
29
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Apr
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561-572, Apr. 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
30
-
-
36348989432
-
-
K. Nandakumar, A. K. Jain, and S. Pankanti, Fingerprint-based fuzzy vault: implementation and performance, Michigan State Univ., East Lansing, Tech. Rep. TR-06-31., 2006. [Online], Available: http://www.cse.msu. edu/cgi-user/web/tech/document?ID=675.
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: implementation and performance," Michigan State Univ., East Lansing, Tech. Rep. TR-06-31., 2006. [Online], Available: http://www.cse.msu. edu/cgi-user/web/tech/document?ID=675.
-
-
-
-
31
-
-
33845533494
-
Fingerprint classification using orientation field flow curves
-
Kolkata, India, Dec
-
S. C. Dass and A. K. Jain, "Fingerprint classification using orientation field flow curves," in Proc. Indian Conf. Computer Vision, Graphics and Image Processing, Kolkata, India, Dec. 2004, pp. 650-655.
-
(2004)
Proc. Indian Conf. Computer Vision, Graphics and Image Processing
, pp. 650-655
-
-
Dass, S.C.1
Jain, A.K.2
-
32
-
-
4544277989
-
Markov random, field models for directional field and singularity extraction in. fingerprint images
-
Oct
-
S. C. Dass, "Markov random, field models for directional field and singularity extraction in. fingerprint images," IEEE Trans. Image Process., vol. 13, no. 10, pp. 1358-1367, Oct. 2004.
-
(2004)
IEEE Trans. Image Process
, vol.13
, Issue.10
, pp. 1358-1367
-
-
Dass, S.C.1
-
33
-
-
0026821209
-
A method for registration of 3-D shapes
-
Feb
-
P. Besl and N. McKay, "A method for registration of 3-D shapes," IEEE Trans. Pattern Anal Mach. Intell., vol. 14, no. 2, pp. 239-256, Feb. 1992.
-
(1992)
IEEE Trans. Pattern Anal Mach. Intell
, vol.14
, Issue.2
, pp. 239-256
-
-
Besl, P.1
McKay, N.2
-
34
-
-
33751562427
-
The trimmed iterative closest point algorithm
-
Quebec City, QC, Canada, Aug
-
D. Chetverikov, D. Svirko, D. Stepanov, and P. Krsek, "The trimmed iterative closest point algorithm," in Proc. Int. Conf. Pattern Recognition, Quebec City, QC, Canada, Aug. 2002, pp. 545-548.
-
(2002)
Proc. Int. Conf. Pattern Recognition
, pp. 545-548
-
-
Chetverikov, D.1
Svirko, D.2
Stepanov, D.3
Krsek, P.4
-
35
-
-
33751580079
-
FVC2002: Second fingerprint verification competition
-
Quebec City, QC, Canada, Aug
-
D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, "FVC2002: Second fingerprint verification competition," in Proc. Int. Conf. Pattern Recognition, Quebec City, QC, Canada, Aug. 2002, pp. 811-814.
-
(2002)
Proc. Int. Conf. Pattern Recognition
, pp. 811-814
-
-
Maio, D.1
Maltoni, D.2
Wayman, J.L.3
Jain, A.K.4
-
36
-
-
0003904755
-
-
Michigan State Univ, East Lansing, MI, Tech. Rep. TR99-14
-
A. K. Jain, S. Prabhakar, and A. Ross, "Fingerprint matching: Data acquisition and performance evaluation," Michigan State Univ., East Lansing, MI, Tech. Rep. TR99-14, 1999.
-
(1999)
Fingerprint matching: Data acquisition and performance evaluation
-
-
Jain, A.K.1
Prabhakar, S.2
Ross, A.3
-
37
-
-
33747742511
-
Image versus feature mosaicing: A case study in fingerprints
-
Orlando, FL, Apr
-
A. Ross, S. Shah, and J. Shah, "Image versus feature mosaicing: A case study in fingerprints," in Proc. SPIE Conf. Biometric Technology for Human Identification, Orlando, FL, Apr. 2006, vol. 6202, pp. 1-12.
-
(2006)
Proc. SPIE Conf. Biometric Technology for Human Identification
, vol.6202
, pp. 1-12
-
-
Ross, A.1
Shah, S.2
Shah, J.3
|