-
1
-
-
42949154119
-
-
G. Tomko, Biometrics as a privacy-enhancing technology: Friend or foe of privacy?, In Privacy Laws & Business 9th Privacy Commissioners/Data Protection Authorities Workshop, 1998.
-
G. Tomko, "Biometrics as a privacy-enhancing technology: Friend or foe of privacy?," In Privacy Laws & Business 9th Privacy Commissioners/Data Protection Authorities Workshop, 1998.
-
-
-
-
2
-
-
42949175022
-
Biometrics and privacy: The end of the world as we know it or the white knight of privacy?
-
M. Crompton, "Biometrics and privacy: The end of the world as we know it or the white knight of privacy?," in First Biometrics Institute Conference, 2003.
-
(2003)
First Biometrics Institute Conference
-
-
Crompton, M.1
-
3
-
-
0037278262
-
Genetic disorders of palm skin and nail
-
W. H. I. McLean, "Genetic disorders of palm skin and nail," Journal of Anatomy 202(1), pp. 133-141, 2003.
-
(2003)
Journal of Anatomy
, vol.202
, Issue.1
, pp. 133-141
-
-
McLean, W.H.I.1
-
4
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J. 40(3), pp. 614-634, 2001.
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
5
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell. 29(4), pp. 561-572, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
7
-
-
70450282120
-
Multimodal biometric templates for verification using fingerprints and voice
-
16-20 March
-
E. Camlikaya, A. Kholmatov, and B. A. Yanikoglu, "Multimodal biometric templates for verification using fingerprints and voice," in Biometric Technology For Human Identification V, Proceedings of SPIE, 16-20 March, 2008.
-
(2008)
Biometric Technology For Human Identification V, Proceedings of SPIE
-
-
Camlikaya, E.1
Kholmatov, A.2
Yanikoglu, B.A.3
-
10
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
A. Teoh Beng Jin, D. Ngo Chek Ling, and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognition 37(11), pp. 2245-2255, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh Beng Jin, A.1
Ngo Chek Ling, D.2
Goh, A.3
-
11
-
-
8844277754
-
Privacy protected biometric templates: Acoustic ear identification
-
P. Tuyls, E. Verbitskiy, T. Ignatenko, D. Denteneer, and T. Akkermans, "Privacy protected biometric templates: Acoustic ear identification," Proceedings of SPIE: Biometric Technology for Human Identification 5404, pp. 176-182, 2004.
-
(2004)
Proceedings of SPIE: Biometric Technology for Human Identification
, vol.5404
, pp. 176-182
-
-
Tuyls, P.1
Verbitskiy, E.2
Ignatenko, T.3
Denteneer, D.4
Akkermans, T.5
-
12
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Proceeding of International Conference on Audio and Video Based Biometric Person Authentication
-
J. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," Proceeding of International Conference on Audio and Video Based Biometric Person Authentication (LNCS 2688), pp. 393-402, 2003.
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.1
Tuyls, P.2
-
13
-
-
0010073906
-
On enabling secure applications through on-line biometric identification
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through on-line biometric identification," In IEEE Symposium on Privacy and Security , p. 408, 1998.
-
(1998)
In IEEE Symposium on Privacy and Security
, pp. 408
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
14
-
-
8344236959
-
-
R.K. Nichols, McGraw-Hill, Ed
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and V. Kumar, Biometric Encryption, Chapter 22 of the ICSA Guide to Cryptography, R.K. Nichols, McGraw-Hill, Ed. 1999.
-
(1999)
Biometric Encryption, Chapter 22 of the ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, V.5
-
15
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, S. Stojanov, R. Gilroy, and B. V. Kumar, "Biometric encryption using image processing," In Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques II3314, pp. 178-188, 1998.
-
(1998)
Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.3
Gilroy, R.4
Kumar, B.V.5
-
17
-
-
26444525625
-
Fuzzy vault for fingerprints
-
U. Uludag, S. Pankanti, and A. Jain., "Fuzzy vault for fingerprints," Proceeding of International Conference on Audio and Video Based Biometric Person Authentication, pp. 310-319, 2005.
-
(2005)
Proceeding of International Conference on Audio and Video Based Biometric Person Authentication
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.3
-
18
-
-
21644442033
-
Secure fuzzy vault based fingerprint verification system
-
S. Yang and I. Verbauwhede, "Secure fuzzy vault based fingerprint verification system," Signals, Systems and Computers, 2004- Conference Record of the Thirty-Eighth Asilomar Conference on, pp. 577-581, 2004.
-
(2004)
Signals, Systems and Computers, 2004- Conference Record of the Thirty-Eighth Asilomar Conference on
, pp. 577-581
-
-
Yang, S.1
Verbauwhede, I.2
-
19
-
-
33747661750
-
Secret sharing using biometric traits
-
18 April
-
A. Kholmatov, B. A. Yanikoglu, E. Savas, and A. Levi, "Secret sharing using biometric traits," in Biometric Technology For Human Identification III, Proceedings of SPIE, 6202, 18 April, 2006.
-
(2006)
Biometric Technology For Human Identification III, Proceedings of SPIE
, vol.6202
-
-
Kholmatov, A.1
Yanikoglu, B.A.2
Savas, E.3
Levi, A.4
-
21
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
K. Nandakumar, A. Nagar, and A. K. Jain, "Hardening fingerprint fuzzy vault using password," in International Conference on Biometrics, pp. 927-937, 2007.
-
(2007)
International Conference on Biometrics
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.K.3
|