-
1
-
-
0027629488
-
Common randomness in information theory and cryptography, part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
2
-
-
33646728406
-
Face authentication using one-class support vector machines
-
Advances in Biometric Person Authentication, International Workshop on Biometric Recognition Systems IWBRS '05, Berlin, Germany: Springer-Verlag
-
M. Bicego, E. Grosso, and M. Tistarelli, "Face authentication using one-class support vector machines," in Advances in Biometric Person Authentication - International Workshop on Biometric Recognition Systems IWBRS '05, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2005, vol. 3781, pp. 15-22.
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3781
, pp. 15-22
-
-
Bicego, M.1
Grosso, E.2
Tistarelli, M.3
-
4
-
-
33746049783
-
Hiding secret points amidst chaff
-
Advances in Cryptology, EUROCRYPT '06, Berlin, Germany: Springer-Verlag
-
E.-C. Chang and Q. Li, "Hiding secret points amidst chaff," in Advances in Cryptology - EUROCRYPT '06, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2006, vol. 4004, pp. 59-72.
-
(2006)
ser. Lecture Notes in Computer Science
, vol.4004
, pp. 59-72
-
-
Chang, E.-C.1
Li, Q.2
-
5
-
-
38149087056
-
Secret sharing over infinite domains
-
Advances in Cryptology, CRYPTO '89, Berlin, Germany: Springer-Verlag
-
B. Chor and E. Kushilevitz, "Secret sharing over infinite domains," in Advances in Cryptology - CRYPTO '89, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 1990, vol. 434, pp. 299-306.
-
(1990)
ser. Lecture Notes in Computer Science
, vol.434
, pp. 299-306
-
-
Chor, B.1
Kushilevitz, E.2
-
6
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Security Privacy, 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Security Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
7
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Advances in Cryptology, EUROCRYPT '04, Berlin, Germany: Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology - EUROCRYPT '04, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2004, vol. 3027, pp. 523-540.
-
(2004)
ser. Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
0023417913
-
On the relationship between the information measures and the Bayes probability of error
-
Sep
-
J. Dj. Golić, "On the relationship between the information measures and the Bayes probability of error," IEEE Trans. Inf. Theory, vol. IT-33, no. 5, pp. 681-693, Sep. 1987.
-
(1987)
IEEE Trans. Inf. Theory
, vol.IT-33
, Issue.5
, pp. 681-693
-
-
Golić, J.D.1
-
10
-
-
43749107395
-
-
F. Hao, R. Anderson, and J. Daugman, Combining cryptography with biometrics effectively, Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
-
F. Hao, R. Anderson, and J. Daugman, "Combining cryptography with biometrics effectively," Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
-
-
-
-
11
-
-
0345253860
-
Construction of pseudorandom number generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, "Construction of pseudorandom number generator from any one-way function," SIAM J. Comput., vol. 28, pp. 1364-1396, 1999.
-
(1999)
SIAM J. Comput
, vol.28
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
12
-
-
10044281345
-
A novel adaptive image enhancement algorithm for face detection
-
L. Jin, S. Satoh, and M. Sakauchi, "A novel adaptive image enhancement algorithm for face detection," in Proc. 17th Int. Conf. Pattern Recognit. - ICPR, 2004, vol. 4, pp. 843-848.
-
(2004)
Proc. 17th Int. Conf. Pattern Recognit. - ICPR
, vol.4
, pp. 843-848
-
-
Jin, L.1
Satoh, S.2
Sakauchi, M.3
-
14
-
-
38149140493
-
A fuzzy commitment scheme,
-
PCT Appl. WO 00/51244 A1, Aug. 2000
-
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," PCT Appl. WO 00/51244 A1, Aug. 2000.
-
-
-
Juels, A.1
Wattenberg, M.2
-
16
-
-
33646095185
-
An analysis of BioHashing and its variants
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of BioHashing and its variants," Pattern Recognit., vol. 39, no. 7, pp. 1359-1368, 2006.
-
(2006)
Pattern Recognit
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
17
-
-
77649250983
-
Secure sketch for biometric templates
-
Advances in Cryptology, ASIACRYPT '06, Berlin, Germany: Springer-Verlag
-
Q. Li, Y. Sutcu, and N. Memon, "Secure sketch for biometric templates," in Advances in Cryptology - ASIACRYPT '06, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2006, vol. 4284, pp. 99-113.
-
(2006)
ser. Lecture Notes in Computer Science
, vol.4284
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
19
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
J. Radhakrishnan and A. Ta-Shma, "Bounds for dispersers, extractors, and depth-two superconcentrators," SIAM J. Discrete Math., vol. 13, pp. 2-24, 2000.
-
(2000)
SIAM J. Discrete Math
, vol.13
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
20
-
-
33846089260
-
Guessing under source uncertainty
-
Jan
-
R. Sundaresan, "Guessing under source uncertainty," IEEE Trans. Inf. Theory, vol. 53, no. 1, pp. 269-287, Jan. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.1
, pp. 269-287
-
-
Sundaresan, R.1
-
21
-
-
0035358438
-
Convexity-based visual camouflage breaking
-
A. Tankus and Y. Yeshurun, "Convexity-based visual camouflage breaking," Comput. Vis. Image Understand., vol. 82, no. 3, pp. 208-237, 2001.
-
(2001)
Comput. Vis. Image Understand
, vol.82
, Issue.3
, pp. 208-237
-
-
Tankus, A.1
Yeshurun, Y.2
-
22
-
-
8344273612
-
Personalized cryptographic key generation based on FaceHashing
-
Oct
-
A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "Personalized cryptographic key generation based on FaceHashing," Comput. Security, vol. 23, no. 7, pp. 606-614, Oct. 2004.
-
(2004)
Comput. Security
, vol.23
, Issue.7
, pp. 606-614
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
23
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
ECCW Workshop BioAW, Berlin, Germany: Springer-Verlag
-
P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in ECCW Workshop BioAW, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2004, vol. 3087, pp. 158-170.
-
(2004)
ser. Lecture Notes in Computer Science
, vol.3087
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
24
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Cryptographic Hardware and Embedded Systems, CHES '06, Berlin, Germany: Springer-Verlag
-
P. Tuyls, G.-J. Schrijen, B. Skoric, J. van Geloven, N. Verhaegh, and R. Wolters, "Read-proof hardware from protective coatings," in Cryptographic Hardware and Embedded Systems - CHES '06, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, 2006, vol. 4249. pp. 369-383.
-
(2006)
ser. Lecture Notes in Computer Science
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Skoric, B.3
van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
25
-
-
33645656961
-
Face biometrics with renewable templates
-
M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and F. Zuo, "Face biometrics with renewable templates," in Proc. SPIE Security, Steganography, Watermarking Multimedia Contents VIII, 2006, vol. 6072, 60729J.
-
(2006)
Proc. SPIE Security, Steganography, Watermarking Multimedia Contents VIII
, vol.6072
-
-
van der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
26
-
-
38149047062
-
Method of using biometric information for secret generation,
-
PCT Appl. WO 02/078249 A1, Mar. 2001
-
Y. D. Wu, "Method of using biometric information for secret generation," PCT Appl. WO 02/078249 A1, Mar. 2001.
-
-
-
Wu, Y.D.1
|