-
1
-
-
56749117925
-
-
Advanced Encryption Standard (AES), Standard, Federal Information Processing Standards Publication 197, National Institute of Standards and Technology, November 2001, http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
-
"Advanced Encryption Standard (AES)," Standard, Federal Information Processing Standards Publication 197, National Institute of Standards and Technology, November 2001, http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
-
-
-
-
2
-
-
10044222391
-
Biometric Cryptosystems: Issues and Challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, "Biometric Cryptosystems: Issues and Challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
3
-
-
38149030200
-
Biometrie Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy
-
Information and privacy commissioner of Ontario, March
-
Ann Cavoukian and Alex Stoianov, "Biometrie Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy," White paper, Information and privacy commissioner of Ontario, March 2007.
-
(2007)
White paper
-
-
Cavoukian, A.1
Stoianov, A.2
-
4
-
-
33947530278
-
Generating Cancelable Fingerprint Templates
-
April
-
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and Ruud M. Bolle, "Generating Cancelable Fingerprint Templates," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
5
-
-
34948865766
-
Revocable Fingerprint Biotokens: Accuracy and Security Analysis
-
June
-
T. E. Boult, W. J. Scheirer, and R. Woodworm, "Revocable Fingerprint Biotokens: Accuracy and Security Analysis," in IEEE Conference on Computer Vision and Pattern Recognition, June 2007, pp. 1-8.
-
(2007)
IEEE Conference on Computer Vision and Pattern Recognition
, pp. 1-8
-
-
Boult, T.E.1
Scheirer, W.J.2
Woodworm, R.3
-
6
-
-
33750533142
-
An Improved BioHashing for Human Authentication
-
March
-
Alessandra Lumini and Loris Nanni, "An Improved BioHashing for Human Authentication," Pattern Recognition, vol. 40, no. 3, pp. 1057-1065, March 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
7
-
-
10044284550
-
Cancelable Biometric Filters for Face Recognition
-
August
-
Marios Savvides, B.V.K. Vijaya Kumar, and P.K. Khosla, "Cancelable Biometric Filters for Face Recognition," in Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), August 2004, vol. 3, pp. 922-925.
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition (ICPR04)
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.V.K.2
Khosla, P.K.3
-
8
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," in Proceedings of the Eurocrypt 2004, 2004, pp. 523-540.
-
(2004)
Proceedings of the Eurocrypt 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
0033281372
-
Password Hardening Based on Keystroke Dynamics
-
F. Monrose, M.K. Reiter, and R. Wetzel, "Password Hardening Based on Keystroke Dynamics," in Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), 1999, pp. 73-82.
-
(1999)
Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS)
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, R.3
-
10
-
-
0034829626
-
Cryptographic Key Generation from Voice
-
May
-
F. Monrose, M.K. Reiter, Qi Li, and S. Wetzel, "Cryptographic Key Generation from Voice," in Proceedings of the IEEE Symposium on Security and Privacy, May 2001, pp. 202-213.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
11
-
-
35248868841
-
Computation of Cryptographic Keys from Face Biometrics
-
Proceedings of the International Federation for Information Processing, A. Lioy and D. Mazzocchi, Eds, of, Springer Berlin, Heidelberg
-
Alwyn Goh and David C.L. Ngo, "Computation of Cryptographic Keys from Face Biometrics," in Proceedings of the International Federation for Information Processing, A. Lioy and D. Mazzocchi, Eds. 2003, vol. 2828 of Lecture Notes in Computer Science, pp. 1-13, Springer Berlin / Heidelberg.
-
(2003)
Lecture Notes in Computer Science
, vol.2828
, pp. 1-13
-
-
Goh, A.1
Ngo, D.C.L.2
-
12
-
-
8344273612
-
Personalised Cryptographic Key Generation Based on FaceHashing
-
Andrew B.J. Teoh, David C.L. Ngo, and Alwyn Goh, "Personalised Cryptographic Key Generation Based on FaceHashing," Computers & Security, vol. 23, pp. 606-614, 2004.
-
(2004)
Computers & Security
, vol.23
, pp. 606-614
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
13
-
-
11244340682
-
Biometrics-Based Cryptographic Key Generation
-
June
-
Yuo-Jen Chang, Wende Zhung, and Tsiihun Chen, "Biometrics-Based Cryptographic Key Generation," in IEEE International Conference on Multimedia and Expo (ICME), June 2004, vol. 3, pp. 2203-2206.
-
(2004)
IEEE International Conference on Multimedia and Expo (ICME)
, vol.3
, pp. 2203-2206
-
-
Chang, Y.-J.1
Zhung, W.2
Chen, T.3
-
15
-
-
8844234621
-
On the Relation of Error Correction and Cryptography to an Offline Biometrie Based Identification Scheme
-
G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta, "On the Relation of Error Correction and Cryptography to an Offline Biometrie Based Identification Scheme," in Proc. Workshop on Coding and Cryptography, 1999, pp. 129-138.
-
(1999)
Proc. Workshop on Coding and Cryptography
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
16
-
-
20244382052
-
-
chapter 22, McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B.V.K. Vijaya Kumar, Biometric Encryption, chapter 22, McGraw-Hill, 1999.
-
(1999)
Biometric Encryption
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
17
-
-
84937704662
-
Secure Smartcard-Based Fingerprint Authentication
-
November
-
T. Charles Clancy, Negar Kiyavash, and Dennis J. Lin, "Secure Smartcard-Based Fingerprint Authentication," in Proceeding of ACM SIGMM Workshop on Biometrics Methods and Applications, November 2003, pp. 45-52.
-
(2003)
Proceeding of ACM SIGMM Workshop on Biometrics Methods and Applications
, pp. 45-52
-
-
Charles Clancy, T.1
Kiyavash, N.2
Lin, D.J.3
-
19
-
-
0036350106
-
A Fuzzy Vault Scheme
-
A. Lapidoth and E. Teletar, Eds, IEEE Press
-
A. Juels and M. Sudan, "A Fuzzy Vault Scheme," in Proc. IEEE Int. Symp. Information Theory, A. Lapidoth and E. Teletar, Eds. 2002, p. 408, IEEE Press.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
20
-
-
33747624401
-
Combining Crypto with Biometrics Effectively
-
Feng Hao, Ross Anderson, and John Daugman, "Combining Crypto with Biometrics Effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
21
-
-
0027700869
-
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
-
November
-
John Daugman, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence," IEEE Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148-1161, November 1993.
-
(1993)
IEEE Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
22
-
-
48649102434
-
Optimal Iris Fuzzy Sketches
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zmor, "Optimal Iris Fuzzy Sketches," in IEEE Conference on Biometrics: Theory, Applications and Systems, 2007.
-
(2007)
IEEE Conference on Biometrics: Theory, Applications and Systems
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zmor, G.5
-
23
-
-
48649087855
-
-
National Institute of Science and Technology NIST
-
National Institute of Science and Technology (NIST), "Iris Challenge Evaluation," 2005, http://iris.nist.gov/ice.
-
(2005)
Iris Challenge Evaluation
-
-
-
24
-
-
70450209665
-
-
Springer-Verlag
-
Emine Krichen, Bernadette Dorizzi, Zhenan Sun, Sonia Garcia-Salicetti, and Tieniu Tan, Guide to Biometric Reference Systems and Performance Evaluation, chapter Iris Recognition, pp. 25-50, Springer-Verlag, 2008.
-
(2008)
Guide to Biometric Reference Systems and Performance Evaluation, chapter Iris Recognition
, pp. 25-50
-
-
Krichen, E.1
Dorizzi, B.2
Sun, Z.3
Garcia-Salicetti, S.4
Tan, T.5
-
25
-
-
47849088466
-
-
Ph.D. thesis, Institut National des Télécommunications, Evry, France
-
Emine Krichen, Reconnaissance des Personnes par l'Iris en Mode Dégradé, Ph.D. thesis, Institut National des Télécommunications, Evry, France, 2007.
-
(2007)
Reconnaissance des Personnes par l'Iris en Mode Dégradé
-
-
Krichen, E.1
-
28
-
-
0036487317
-
The Importance of Being Random: Statistical Principles of Iris Recognition
-
February
-
John Daugman, "The Importance of Being Random: Statistical Principles of Iris Recognition," Pattern Recognition, vol. 36, no. 2, pp. 279-291, February 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
|