-
4
-
-
26444513211
-
Secure biometric authentication for weak computational devices
-
M. J. Atallah, K. B. Frikken, M. T. Goodrich, and R. Tamassia. Secure biometric authentication for weak computational devices. In Financial Cryptography, pages 357-371, 2005.
-
(2005)
Financial Cryptography
, pp. 357-371
-
-
Atallah, M.J.1
Frikken, K.B.2
Goodrich, M.T.3
Tamassia, R.4
-
5
-
-
85069026426
-
-
An authentication protocol with encrypted biometric data. To appear in
-
J. Bringer and H. Chabanne. An authentication protocol with encrypted biometric data. To appear in AfricaCrypt, 2008.
-
(2008)
AfricaCrypt
-
-
Bringer, J.1
Chabanne, H.2
-
6
-
-
48649102434
-
Optimal iris fuzzy sketches
-
IEEE Press
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor. Optimal iris fuzzy sketches. In IEEE Conference on Biometrics: Transactions, Applications and Systems-BTAS'07. IEEE Press, 2007.
-
(2007)
IEEE Conference on Biometrics: Transactions, Applications and Systems-BTAS'07
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
7
-
-
33646034883
-
A fuzzy sketch with trapdoor
-
J. Bringer, H. Chabanne, and Q. D. Do. A fuzzy sketch with trapdoor. IEEE Transactions on Information Theory, 52(5):2266-2269, 2006.
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.5
, pp. 2266-2269
-
-
Bringer, J.1
Chabanne, H.2
Do, Q.D.3
-
8
-
-
38149070898
-
An application of the Goldwasser-Micali cryptosystem to biometric authentication
-
J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang, and S. Zimmer. An application of the Goldwasser-Micali cryptosystem to biometric authentication. In ACISP, pages 96-106, 2007.
-
(2007)
ACISP
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachène, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
9
-
-
56349139535
-
-
J. Bringer, H. Chabanne, and B. Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Science of Computer Programming, 2008. To appear. Presented at WISSec'07.
-
J. Bringer, H. Chabanne, and B. Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Science of Computer Programming, 2008. To appear. Presented at WISSec'07.
-
-
-
-
10
-
-
69949176476
-
Extended private information retrieval and its application in biometrics authentications
-
J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang. Extended private information retrieval and its application in biometrics authentications. In CANS, 2007.
-
(2007)
CANS
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Tang, Q.4
-
12
-
-
38149030200
-
Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacyp
-
Technical report, Information and Privacy Commissioner, Ontario, March
-
A. Cavoukian and A. Stoianov. Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacyp. Technical report, Information and Privacy Commissioner / Ontario, March 2007.
-
(2007)
-
-
Cavoukian, A.1
Stoianov, A.2
-
13
-
-
35048865463
-
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extrators: How to generate strong secret keys from biometrics and other noisy data. In L. 3027, editor, In Advances in cryptology - Eurocrypt'04, pages 523-540. Springer, 2004.
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extrators: How to generate strong secret keys from biometrics and other noisy data. In L. 3027, editor, In Advances in cryptology - Eurocrypt'04, pages 523-540. Springer, 2004.
-
-
-
-
14
-
-
85069024539
-
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia. Using distributed source coding to secure fingerprint biometrics. Technical Report TR 2007-005, Mitsubishi Electrical Research Laboratories, Jan. 2007.
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia. Using distributed source coding to secure fingerprint biometrics. Technical Report TR 2007-005, Mitsubishi Electrical Research Laboratories, Jan. 2007.
-
-
-
-
15
-
-
33748996753
-
Secure multiparty computation of approximations
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. J. Strauss, and R. N. Wright. Secure multiparty computation of approximations. ACM Transactions on Algorithms, 2(3):435-472, 2006.
-
(2006)
ACM Transactions on Algorithms
, vol.2
, Issue.3
, pp. 435-472
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.J.5
Wright, R.N.6
-
17
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Computer, 55:1081-1088, 2006.
-
(2006)
IEEE Computer
, vol.55
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
20
-
-
85069025887
-
-
A. N. K. Nandakumar and A. Jain. Hardening fingerprint fuzzy vault using password. In ICB, 2007.
-
A. N. K. Nandakumar and A. Jain. Hardening fingerprint fuzzy vault using password. In ICB, 2007.
-
-
-
-
23
-
-
0034809453
-
Enhancing security and privacy of biometric-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy of biometric-based authentication systems. IBM Systems Journal, 40, 2001.
-
(2001)
IBM Systems Journal
, vol.40
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
24
-
-
33947530278
-
Generating cancelable fingerprint templates
-
April
-
N. Ratha, S. Chikkerur, J. Connell, and R. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):561-572, April 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.3
Bolle, R.4
-
25
-
-
50249107013
-
Cracking fuzzy vault and biometric encryption
-
IEEE Press, September
-
W. J. Scheirer and T. E. Boult. Cracking fuzzy vault and biometric encryption. In Biometric Symposium, pages 1-6. IEEE Press, September 2007.
-
(2007)
Biometric Symposium
, pp. 1-6
-
-
Scheirer, W.J.1
Boult, T.E.2
-
26
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. In EUROCRYPT, pages 522-537, 2006.
-
(2006)
EUROCRYPT
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
27
-
-
54049105192
-
Fingerprint controlled public key cryptographics system
-
US Patent 5541994A, September 1994
-
G. Tomko, C. Soutar, and J. Schmidt. Fingerprint controlled public key cryptographics system. US Patent 5541994A, September 1994.
-
-
-
Tomko, G.1
Soutar, C.2
Schmidt, J.3
-
28
-
-
26444507172
-
Practical biometric authentication with template protection
-
Audio- and Video-Based Biometric Person Authentication, of, Springer Belin, Heidelberg, June
-
P. Tuyls, A. M. Akkermans, T. Kevenaar, G.J. Schrijen, A.M. Bazen, and R.N.J. Veldhuis. Practical biometric authentication with template protection. In Audio- and Video-Based Biometric Person Authentication, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer Belin / Heidelberg, June 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.M.2
Kevenaar, T.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
29
-
-
33845435077
-
Capacity and examples of template protecting biometric authentication systems. In LNCS, editor
-
Prague
-
P. Tuyls and J. Goseling. Capacity and examples of template protecting biometric authentication systems. In LNCS, editor, Biometric authentication workshop (BioAW 2004), volume 3087, pages 158-170, Prague, 2004.
-
(2004)
Biometric authentication workshop (BioAW 2004)
, vol.3087
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
30
-
-
8844277754
-
Privacy protected biometric templates: Ear identification
-
April
-
P. Tuyls, E. Verbitskiy, T. Ignatenko, D. Schobben, and T. H. Akkermans. Privacy protected biometric templates: ear identification. In Proceeding of SPIE, volume 5404, pages 176-182, April 2004.
-
(2004)
Proceeding of SPIE
, vol.5404
, pp. 176-182
-
-
Tuyls, P.1
Verbitskiy, E.2
Ignatenko, T.3
Schobben, D.4
Akkermans, T.H.5
-
32
-
-
33645656961
-
Face biometrics with renewable templates
-
SPIE
-
M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. Akkermans, and F. Zuo. Face biometrics with renewable templates. In Proceedings of SPIE, volume 6072. SPIE, 2006.
-
(2006)
Proceedings of SPIE
, vol.6072
-
-
van der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.4
Zuo, F.5
-
33
-
-
84873884975
-
-
X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak. Privacy enhancing technology for a 3d-face recognition system. In BIOSIG 2007: Biometrics and Electronic Signatures, P-108 of Lecture Notes in Informatics, pages 3-14. GI-Edition, July 2007.
-
X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak. Privacy enhancing technology for a 3d-face recognition system. In BIOSIG 2007: Biometrics and Electronic Signatures, volume P-108 of Lecture Notes in Informatics, pages 3-14. GI-Edition, July 2007.
-
-
-
|