-
1
-
-
24944501364
-
Secure remote authentication using biometric data
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
2
-
-
84958742278
-
-
Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477, pp. 326-341. Springer, Heidelberg (2002)
-
Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 326-341. Springer, Heidelberg (2002)
-
-
-
-
3
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.: On the security of public key protocols. Information Theory, IEEE Transactions on 29, 198-208 (1983)
-
(1983)
Information Theory, IEEE Transactions on
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
4
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
Lisboa, Portugal, 4-7 July, IEEE Computer Society Press, Los Alamitos () 2006
-
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, 4-7 July 2006, p. 10. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
26th IEEE International Conference on Distributed Computing Systems (ICDCS
, pp. 10
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
5
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Kittler, J, Nixon, M.S, eds, AVBPA 2003, Springer, Heidelberg
-
Linnartz, J.P, Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.P.1
Tuyls, P.2
-
6
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
IEEE Computer Society Press, Los Alamitos
-
McCune, J., Perrig, A., Reiter, M.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Security and Privacy, 2005 IEEE Symposium on, pp. 110-124. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
, pp. 110-124
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
7
-
-
37849028635
-
Personalized weapons technology project, progress report
-
NJIT:, Technical report, New Jersey Institute of Technology April
-
NJIT: Personalized weapons technology project, progress report. Technical report, New Jersey Institute of Technology (April 2001)
-
(2001)
-
-
-
8
-
-
84944068562
-
-
Pliam, J.O.: Guesswork and variation distance as measures of cipher security. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758. Springer, Heidelberg (2000)
-
Pliam, J.O.: Guesswork and variation distance as measures of cipher security. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758. Springer, Heidelberg (2000)
-
-
-
-
9
-
-
33751023773
-
-
Saxena, N., Ekberg, J., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel (short paper). SP, 306-313 (2006)
-
Saxena, N., Ekberg, J., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel (short paper). SP, 306-313 (2006)
-
-
-
-
10
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
11
-
-
8844254687
-
Biometric verification based on grip-pattern recognition
-
San Jose, California, USA, January 18-22
-
Veldhuis, R.N.J., Bazen, A.M., Kauffman, J.A., Hartel, P.H.: Biometric verification based on grip-pattern recognition. In: Security, Steganography, and Watermarking of Multimedia Contents VI, Proceedings of SPIE, San Jose, California, USA, January 18-22, 2004, vol. 5306, pp. 634-641 (2004)
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents VI, Proceedings of SPIE
, vol.5306
, pp. 634-641
-
-
Veldhuis, R.N.J.1
Bazen, A.M.2
Kauffman, J.A.3
Hartel, P.H.4
-
12
-
-
33750291956
-
Multi-channel protocols for group key agreement in arbitrary topologies
-
Pisa, Italy, 13-17 March, IEEE Computer Society Press, Los Alamitos
-
Wong, F.L., Stajano, F.: Multi-channel protocols for group key agreement in arbitrary topologies. In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), Pisa, Italy, 13-17 March 2006, pp. 246-250. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops)
, pp. 246-250
-
-
Wong, F.L.1
Stajano, F.2
|