-
1
-
-
33947506091
-
Method for producing a digital signature with aid of a biometric feature,
-
German Patent DE 4243908A1
-
A. Bodo, "Method for producing a digital signature with aid of a biometric feature," German Patent DE 4243908A1, 1994.
-
(1994)
-
-
Bodo, A.1
-
2
-
-
44049099485
-
-
J. Boiling, A window to your health, Special Issue: Retinal Diseases: Capacity and Examples, Jacksonville Medicine, 51, 2000.
-
J. Boiling, "A window to your health," Special Issue: Retinal Diseases: Capacity and Examples, Jacksonville Medicine, vol. 51, 2000.
-
-
-
-
3
-
-
11244340682
-
Biometric-based cryptographic key generation
-
Y. Chang, W. Zhang, and T. Chen, "Biometric-based cryptographic key generation," in Proc. IEEE Conf. Multimedia and Expo., 2004, pp. 2203-2206.
-
(2004)
Proc. IEEE Conf. Multimedia and Expo
, pp. 2203-2206
-
-
Chang, Y.1
Zhang, W.2
Chen, T.3
-
4
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACMSIGMM Multimedia, Biometrics Methods and Applications Workshop, 2003, pp. 45-52.
-
(2003)
Proc. ACMSIGMM Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
5
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Privacy Security, 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Privacy Security
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
6
-
-
8844234621
-
On the relation of error correction and cryptography to an offline biometric-based identification scheme
-
G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta, "On the relation of error correction and cryptography to an offline biometric-based identification scheme," in Proc. Workshop Coding and Cryptography, 1999, pp. 129-138.
-
(1999)
Proc. Workshop Coding and Cryptography
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
8
-
-
44049089356
-
Evaluating biometric encryption key generation
-
M. Fairhurst, S. Hoque, W. G. J. Howells, and F. Deravi, "Evaluating biometric encryption key generation," in Proc. 3rd Cost 275 Workshop Biometrics Internet, 2005, pp. 93-96.
-
(2005)
Proc. 3rd Cost 275 Workshop Biometrics Internet
, pp. 93-96
-
-
Fairhurst, M.1
Hoque, S.2
Howells, W.G.J.3
Deravi, F.4
-
9
-
-
26444498516
-
An on-line signature verification system based on fusion of local and global information
-
Proc. AVBPA
-
J. Fierrez-Aguilar, L. Nanni, J. Lopez-Penalba, and J. M. Ortega-GarciaD, "An on-line signature verification system based on fusion of local and global information," in Proc. AVBPA, 2005, pp. 523-532, Lecture Notes Comput. Sci. 3546.
-
(2005)
Lecture Notes Comput. Sci
, vol.3546
, pp. 523-532
-
-
Fierrez-Aguilar, J.1
Nanni, L.2
Lopez-Penalba, J.3
Ortega-GarciaD, J.M.4
-
11
-
-
0021412027
-
Vector quantization
-
Apr
-
R. M. Gray, "Vector quantization," IEEE Acoust. Speech Signal Process. Mag., vol. ASSP-1, no. 2, pp. 4-29, Apr. 1984.
-
(1984)
IEEE Acoust. Speech Signal Process. Mag
, vol.ASSP-1
, Issue.2
, pp. 4-29
-
-
Gray, R.M.1
-
13
-
-
0034517479
-
On-Line signature verification based on altitude and direction of pen movement
-
S. Hangai, S. Yamanaka, and T. Hamamoto, "On-Line signature verification based on altitude and direction of pen movement," in Proc. IEEE Int. Conf. Multimedia Expo, 2000, vol. 1, pp. 489-492.
-
(2000)
Proc. IEEE Int. Conf. Multimedia Expo
, vol.1
, pp. 489-492
-
-
Hangai, S.1
Yamanaka, S.2
Hamamoto, T.3
-
14
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
F. Hao and C. W. Chan, "Private key generation from on-line handwritten signatures," Inf. Manage. Comput. Security, vol. 10, no. 4, pp. 159-164, 2002.
-
(2002)
Inf. Manage. Comput. Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
17
-
-
0035780544
-
Novel biometric digital signatures for internet-based applications
-
P. K. Janbandhu and M. Y. Siyal, "Novel biometric digital signatures for internet-based applications," Inf. Manage. Comput. Security, vol. 9, no. 5, pp. 205-212, 2001.
-
(2001)
Inf. Manage. Comput. Security
, vol.9
, Issue.5
, pp. 205-212
-
-
Janbandhu, P.K.1
Siyal, M.Y.2
-
18
-
-
0036350106
-
A fuzzy vault scheme
-
A. Juels and M. Sudan, A. Lapidoth and E. Teletar, Eds
-
A. Juels and M. Sudan, A. Lapidoth and E. Teletar, Eds., "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Information Theory, 2002, p. 408.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 408
-
-
-
22
-
-
0029696153
-
A simple scheme to make passwords based on one-way functions much harder to crack
-
U. Manber, "A simple scheme to make passwords based on one-way functions much harder to crack," Comput. Security, vol. 15, no. 2, pp. 171-176, 1996.
-
(1996)
Comput. Security
, vol.15
, Issue.2
, pp. 171-176
-
-
Manber, U.1
-
23
-
-
84936893490
-
Vital signs of identity
-
Feb
-
B. Miller, "Vital signs of identity," IEEE Spectr., vol. 31, no. 2, pp. 22-30, Feb. 1994.
-
(1994)
IEEE Spectr
, vol.31
, Issue.2
, pp. 22-30
-
-
Miller, B.1
-
24
-
-
0034829626
-
Cryptographic key generation from voice
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice," in Proc. IEEE Symp. Security Privacy, 2001, pp. 202-213.
-
(2001)
Proc. IEEE Symp. Security Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
25
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel, "Password hardening based on keystroke dynamics," in Proc. ACM Conf Computer Communication Security, 1999, pp. 73-82.
-
(1999)
Proc. ACM Conf Computer Communication Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
26
-
-
0029360028
-
On cluster validity for the fuzzy c-means model
-
Aug
-
N. R. Pal and J. C. Bezdìk, "On cluster validity for the fuzzy c-means model," IEEE Trans. Fuzzy Syst., vol. 3, no. 3, pp. 370-379, Aug. 1995.
-
(1995)
IEEE Trans. Fuzzy Syst
, vol.3
, Issue.3
, pp. 370-379
-
-
Pal, N.R.1
Bezdìk, J.C.2
-
27
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
28
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encryption using image processing," Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178-188, 1998.
-
(1998)
Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
30
-
-
8344236959
-
Biometric encryption
-
R. K. Nichols, Ed. New York: McGraw-Hill
-
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encryption," in ICSA Guide to Cryptography, R. K. Nichols, Ed. New York: McGraw-Hill, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
31
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
32
-
-
5044251072
-
Reliable biometric authentication with privacy protection
-
E. Verbitskiy, P. Tuyls, D. Denteneer, and J. P. Linnartz, "Reliable biometric authentication with privacy protection," in Proc. SPIE Conf. Biometric Technology for Human Identification, 2004, pp. 125-132.
-
(2004)
Proc. SPIE Conf. Biometric Technology for Human Identification
, pp. 125-132
-
-
Verbitskiy, E.1
Tuyls, P.2
Denteneer, D.3
Linnartz, J.P.4
-
33
-
-
2942592700
-
Handwriting: Feature correlation analysis for biometric hashes
-
C. Vielhauer and R. Steinmetz, "Handwriting: Feature correlation analysis for biometric hashes," EURASIP J. Appl. Signal Process., vol. 4, pp. 542-558, 2004.
-
(2004)
EURASIP J. Appl. Signal Process
, vol.4
, pp. 542-558
-
-
Vielhauer, C.1
Steinmetz, R.2
-
34
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
C. Vielhauer, R. Steinmetz, and A. Mayerhofer, "Biometric hash based on statistical features of online signatures," in Proc. IEEE Int. Conf. Pattern Recognition, 2002, vol. 1, pp. 123-126.
-
(2002)
Proc. IEEE Int. Conf. Pattern Recognition
, vol.1
, pp. 123-126
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhofer, A.3
-
35
-
-
26444578644
-
-
Berlin, Germany: Springer Verlag
-
J. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Biometric Systems: Technology, Design and Performance Evaluation. Berlin, Germany: Springer Verlag, 2005.
-
(2005)
Biometric Systems: Technology, Design and Performance Evaluation
-
-
Wayman, J.1
Jain, A.K.2
Maltoni, D.3
Maio, D.4
-
36
-
-
0026204245
-
A validity measure for fuzzy clustering
-
Aug
-
X. L. Xie and G. Beni, "A validity measure for fuzzy clustering," IEEE Trans. Pattern Anal. Mach. Intell., vol. 13, no. 8, pp. 841-847, Aug. 1991.
-
(1991)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.13
, Issue.8
, pp. 841-847
-
-
Xie, X.L.1
Beni, G.2
-
37
-
-
0035394221
-
A secure communication system using biometric identity verification
-
Y. Yamazaki and N. Komatsu, "A secure communication system using biometric identity verification," IEICE Trans. Inf. Syst., vol. E84-D, no. 7, pp. 879-884, 2001.
-
(2001)
IEICE Trans. Inf. Syst
, vol.E84-D
, Issue.7
, pp. 879-884
-
-
Yamazaki, Y.1
Komatsu, N.2
-
38
-
-
33749240177
-
Generalized optimal thresholding for biometric key generation using face images
-
W. Zhang and T. Chen, "Generalized optimal thresholding for biometric key generation using face images," in Proc. Int. Conf. Image Processing, 2005, vol. 3, pp. 784-787.
-
(2005)
Proc. Int. Conf. Image Processing
, vol.3
, pp. 784-787
-
-
Zhang, W.1
Chen, T.2
|