메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1063-1068

Pseudo identities based on fingerprint characteristics

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; BIOMETRICS; CRYPTOGRAPHY; DATA PRIVACY; ELECTRIC GENERATORS; PROJECT MANAGEMENT; SIGNAL PROCESSING;

EID: 54049089250     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IIH-MSP.2008.327     Document Type: Conference Paper
Times cited : (14)

References (33)
  • 5
    • 85069026426 scopus 로고    scopus 로고
    • An authentication protocol with encrypted biometric data. To appear in
    • J. Bringer and H. Chabanne. An authentication protocol with encrypted biometric data. To appear in AfricaCrypt, 2008.
    • (2008) AfricaCrypt
    • Bringer, J.1    Chabanne, H.2
  • 8
    • 38149070898 scopus 로고    scopus 로고
    • An application of the Goldwasser-Micali cryptosystem to biometric authentication
    • J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang, and S. Zimmer. An application of the Goldwasser-Micali cryptosystem to biometric authentication. In ACISP, pages 96-106, 2007.
    • (2007) ACISP , pp. 96-106
    • Bringer, J.1    Chabanne, H.2    Izabachène, M.3    Pointcheval, D.4    Tang, Q.5    Zimmer, S.6
  • 9
    • 56349139535 scopus 로고    scopus 로고
    • J. Bringer, H. Chabanne, and B. Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Science of Computer Programming, 2008. To appear. Presented at WISSec'07.
    • J. Bringer, H. Chabanne, and B. Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Science of Computer Programming, 2008. To appear. Presented at WISSec'07.
  • 10
    • 69949176476 scopus 로고    scopus 로고
    • Extended private information retrieval and its application in biometrics authentications
    • J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang. Extended private information retrieval and its application in biometrics authentications. In CANS, 2007.
    • (2007) CANS
    • Bringer, J.1    Chabanne, H.2    Pointcheval, D.3    Tang, Q.4
  • 12
    • 38149030200 scopus 로고    scopus 로고
    • Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacyp
    • Technical report, Information and Privacy Commissioner, Ontario, March
    • A. Cavoukian and A. Stoianov. Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacyp. Technical report, Information and Privacy Commissioner / Ontario, March 2007.
    • (2007)
    • Cavoukian, A.1    Stoianov, A.2
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extrators: How to generate strong secret keys from biometrics and other noisy data. In L. 3027, editor, In Advances in cryptology - Eurocrypt'04, pages 523-540. Springer, 2004.
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extrators: How to generate strong secret keys from biometrics and other noisy data. In L. 3027, editor, In Advances in cryptology - Eurocrypt'04, pages 523-540. Springer, 2004.
  • 14
    • 85069024539 scopus 로고    scopus 로고
    • S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia. Using distributed source coding to secure fingerprint biometrics. Technical Report TR 2007-005, Mitsubishi Electrical Research Laboratories, Jan. 2007.
    • S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia. Using distributed source coding to secure fingerprint biometrics. Technical Report TR 2007-005, Mitsubishi Electrical Research Laboratories, Jan. 2007.
  • 17
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Computer, 55:1081-1088, 2006.
    • (2006) IEEE Computer , vol.55 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 20
    • 85069025887 scopus 로고    scopus 로고
    • A. N. K. Nandakumar and A. Jain. Hardening fingerprint fuzzy vault using password. In ICB, 2007.
    • A. N. K. Nandakumar and A. Jain. Hardening fingerprint fuzzy vault using password. In ICB, 2007.
  • 23
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy of biometric-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy of biometric-based authentication systems. IBM Systems Journal, 40, 2001.
    • (2001) IBM Systems Journal , vol.40
    • Ratha, N.1    Connell, J.2    Bolle, R.3
  • 25
    • 50249107013 scopus 로고    scopus 로고
    • Cracking fuzzy vault and biometric encryption
    • IEEE Press, September
    • W. J. Scheirer and T. E. Boult. Cracking fuzzy vault and biometric encryption. In Biometric Symposium, pages 1-6. IEEE Press, September 2007.
    • (2007) Biometric Symposium , pp. 1-6
    • Scheirer, W.J.1    Boult, T.E.2
  • 26
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for Paillier encrypted values
    • B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. In EUROCRYPT, pages 522-537, 2006.
    • (2006) EUROCRYPT , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 27
    • 54049105192 scopus 로고    scopus 로고
    • Fingerprint controlled public key cryptographics system
    • US Patent 5541994A, September 1994
    • G. Tomko, C. Soutar, and J. Schmidt. Fingerprint controlled public key cryptographics system. US Patent 5541994A, September 1994.
    • Tomko, G.1    Soutar, C.2    Schmidt, J.3
  • 28
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Audio- and Video-Based Biometric Person Authentication, of, Springer Belin, Heidelberg, June
    • P. Tuyls, A. M. Akkermans, T. Kevenaar, G.J. Schrijen, A.M. Bazen, and R.N.J. Veldhuis. Practical biometric authentication with template protection. In Audio- and Video-Based Biometric Person Authentication, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer Belin / Heidelberg, June 2005.
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.M.2    Kevenaar, T.3    Schrijen, G.J.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 29
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template protecting biometric authentication systems. In LNCS, editor
    • Prague
    • P. Tuyls and J. Goseling. Capacity and examples of template protecting biometric authentication systems. In LNCS, editor, Biometric authentication workshop (BioAW 2004), volume 3087, pages 158-170, Prague, 2004.
    • (2004) Biometric authentication workshop (BioAW 2004) , vol.3087 , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 33
    • 84873884975 scopus 로고    scopus 로고
    • X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak. Privacy enhancing technology for a 3d-face recognition system. In BIOSIG 2007: Biometrics and Electronic Signatures, P-108 of Lecture Notes in Informatics, pages 3-14. GI-Edition, July 2007.
    • X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak. Privacy enhancing technology for a 3d-face recognition system. In BIOSIG 2007: Biometrics and Electronic Signatures, volume P-108 of Lecture Notes in Informatics, pages 3-14. GI-Edition, July 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.