-
4
-
-
37849004136
-
Feeling is believing: A secure template exchange protocol
-
International Conference on Biometrics, of
-
I. Buhan. J. Doumen, P. Hartel, and R. Veldhuis. Feeling is believing: a secure template exchange protocol. In International Conference on Biometrics, volume 4642 of LNCS, pages 897-906, 2007.
-
(2007)
LNCS
, vol.4642
, pp. 897-906
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
5
-
-
33746049783
-
Hiding secret points amidst chaff
-
Eurocrypt, of, St. Petersburg, Russia, May, Springer Verlag
-
E.-C. Chang and Q. Li. Hiding secret points amidst chaff. In Eurocrypt, volume 4004 of LNCS, pages 59-72, St. Petersburg, Russia, May 2006. Springer Verlag.
-
(2006)
LNCS
, vol.4004
, pp. 59-72
-
-
Chang, E.-C.1
Li, Q.2
-
8
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Eurocrypt, of, Springer-Verlag
-
Y. Dodis. L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocrypt, volume 3027 of LNCS, pages 523-540. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
33750918446
-
Combining cryptography with biometrics effectively
-
Technical Report UCAM-CL-TR-640. University of Cambridge
-
F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics effectively. Technical Report UCAM-CL-TR-640. University of Cambridge, 2005.
-
(2005)
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
10
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Transactions on Computers, 55(9):1081-1088, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
13
-
-
37849002150
-
3D Face: Biometric template protection for 3D face recognition
-
International Conference on Biometrics, of
-
E. Kelkboom, B. Gökberk, T. Kevenaar, A. Akkermans, and M. van der Veen. "3D Face": Biometric template protection for 3D face recognition. In International Conference on Biometrics, volume 4642 of LNCS, pages 566-573, 2007.
-
(2007)
LNCS
, vol.4642
, pp. 566-573
-
-
Kelkboom, E.1
Gökberk, B.2
Kevenaar, T.3
Akkermans, A.4
van der Veen, M.5
-
14
-
-
42949167255
-
Realization of correlation attack against fuzzy vault scheme
-
A. Kholmatov and B. Yanikoglu. Realization of correlation attack against fuzzy vault scheme. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proceedings of SPIE, 2008.
-
(2008)
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proceedings of SPIE
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
15
-
-
34548057917
-
Secure sketch for biometric templates
-
Shanghai, China, December
-
Q. Li, Y. Sutcu, and N. Memon. Secure sketch for biometric templates. In Asiacrypt, Shanghai, China, December 2006.
-
(2006)
Asiacrypt
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
16
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J.-P. M. G. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA 2003, pages 393-402, 2003.
-
(2003)
AVBPA 2003
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
18
-
-
36348986198
-
Fingerprintbased fuzzy vault: Implementation and performance
-
K. Nandakumar, A. K. Jain, and S. C. Pankanti. Fingerprintbased fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security, 2(4):744-757, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.C.3
-
19
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
20
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Patient Analysis and Machine Intelligence, 29(4):561-572, 2007.
-
(2007)
IEEE Transactions on Patient Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
23
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
A. Teoh, A. Gho, and D. Ngo. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12):1892-1901. 2006.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Gho, A.2
Ngo, D.3
-
25
-
-
26444507172
-
Practical biometric authentication with template protection
-
P. Tuyls, A. Akkermans, T. Kevenaar, G. Schrijen, A. Bazen, and R. Veldhuis. Practical biometric authentication with template protection. In AVBPA, pages 436-446, 2005.
-
(2005)
AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.4
Bazen, A.5
Veldhuis, R.6
-
26
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems. In ECCV Workshop BioAW, pages 158-170, 2004.
-
(2004)
ECCV Workshop BioAW
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
|