메뉴 건너뛰기




Volumn 4642 LNCS, Issue , 2007, Pages 897-906

Feeling is believing: A secure template exchange protocol

Author keywords

Ad hoc authentication; Biometrics; Fuzzy cryptography

Indexed keywords

AUTHENTICATION; BIOMETRICS; CRYPTOGRAPHY; FUZZY SYSTEMS;

EID: 37849004136     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74549-5_94     Document Type: Conference Paper
Times cited : (6)

References (13)
  • 1
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 2
    • 84958742278 scopus 로고    scopus 로고
    • Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477, pp. 326-341. Springer, Heidelberg (2002)
    • Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 326-341. Springer, Heidelberg (2002)
  • 5
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Kittler, J, Nixon, M.S, eds, AVBPA 2003, Springer, Heidelberg
    • Linnartz, J.P, Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2688 , pp. 393-402
    • Linnartz, J.P.1    Tuyls, P.2
  • 6
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • IEEE Computer Society Press, Los Alamitos
    • McCune, J., Perrig, A., Reiter, M.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Security and Privacy, 2005 IEEE Symposium on, pp. 110-124. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) Security and Privacy, 2005 IEEE Symposium on , pp. 110-124
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 7
    • 37849028635 scopus 로고    scopus 로고
    • Personalized weapons technology project, progress report
    • NJIT:, Technical report, New Jersey Institute of Technology April
    • NJIT: Personalized weapons technology project, progress report. Technical report, New Jersey Institute of Technology (April 2001)
    • (2001)
  • 8
    • 84944068562 scopus 로고    scopus 로고
    • Pliam, J.O.: Guesswork and variation distance as measures of cipher security. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758. Springer, Heidelberg (2000)
    • Pliam, J.O.: Guesswork and variation distance as measures of cipher security. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758. Springer, Heidelberg (2000)
  • 9
    • 33751023773 scopus 로고    scopus 로고
    • Saxena, N., Ekberg, J., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel (short paper). SP, 306-313 (2006)
    • Saxena, N., Ekberg, J., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel (short paper). SP, 306-313 (2006)
  • 10
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309-326. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 12


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.