-
1
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proceeding's ACM SIGMM 2003 Multimedia, Biometrics Methods and Workshop, pp. 45-52 (2003)
-
(2003)
Proceeding's ACM SIGMM 2003 Multimedia, Biometrics Methods and Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
2
-
-
0032224440
-
Biometric encryption using image processing
-
Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption using image processing. In: Proceedings of the SPIE - Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178-188 (1998)
-
(1998)
Proceedings of the SPIE - Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
4
-
-
0031651014
-
On enabling secure applications through offline biometric identification
-
Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through offline biometric identification. In: Proceedings of the IEEE Privacy and Security, pp. 148-157 (1998)
-
(1998)
Proceedings of the IEEE Privacy and Security
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
5
-
-
8844234621
-
On the relation of error correction and cryptography to an offline biometric based identification scheme
-
Davida, G.I., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme. In: Proceedings Workshop Coding and Cryptography, pp. 129-138 (1999)
-
(1999)
Proceedings Workshop Coding and Cryptography
, pp. 129-138
-
-
Davida, G.I.1
Matt, B.J.2
Peralta, R.3
-
6
-
-
0034829626
-
Cryptographic Key Generation from Voice
-
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation from Voice. In: Proceedings IEEE Symposium on Security and Privacy (2001)
-
(2001)
Proceedings IEEE Symposium on Security and Privacy
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
7
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of the 6th ACM Conference of Computer and Communications Security, pp. 73-82 (1999)
-
(1999)
Proceedings of the 6th ACM Conference of Computer and Communications Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
10
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Linnartz, J., Linnartz, J.-P., Tuyls, D.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the 4th International Conference on Audio and Video Based Person Authentication, pp. 393-402 (2003)
-
(2003)
Proceedings of the 4th International Conference on Audio and Video Based Person Authentication
, pp. 393-402
-
-
Linnartz, J.1
Linnartz, J.-P.2
Tuyls, D.3
-
12
-
-
46749099815
-
A Framework for Design and Analysis of Asymmetric Fingerprint Protocols
-
August 29-31, pp
-
Poh, G.S., Martin, K.M.: A Framework for Design and Analysis of Asymmetric Fingerprint Protocols. In: Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, pp. 457-461 (2007)
-
(2007)
Third International Symposium on Information Assurance and Security, IAS
, pp. 457-461
-
-
Poh, G.S.1
Martin, K.M.2
-
13
-
-
57049141049
-
-
Schenier, B.: Applied Cryptography Protocol, Algorithms, and Source Code in C, 2nd edn., p. 184. Wiley Computer Publishing/John Wiley and Sons, Chichester (1996)
-
Schenier, B.: Applied Cryptography Protocol, Algorithms, and Source Code in C, 2nd edn., p. 184. Wiley Computer Publishing/John Wiley and Sons, Chichester (1996)
-
-
-
-
14
-
-
0242372124
-
-
Choi, J.G., Sakurai, K., Park, J.H.: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, 2846, pp. 265-279. Springer, Heidelberg (2003)
-
Choi, J.G., Sakurai, K., Park, J.H.: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265-279. Springer, Heidelberg (2003)
-
-
-
-
15
-
-
33645699941
-
A web oriented and interactive buyer-seller watermarking protocol
-
Frattolillo, F., D'Onofrio, S.: A web oriented and interactive buyer-seller watermarking protocol. In: Security, Steganography, and Watermarking of Multimedia Content VIII, Proc. of SPIE-IS and T Electronic Imaging, vol. 6072, pp. 718-716 (2006)
-
(2006)
Security, Steganography, and Watermarking of Multimedia Content VIII, Proc. of SPIE-IS and T Electronic Imaging
, vol.6072
, pp. 718-716
-
-
Frattolillo, F.1
D'Onofrio, S.2
-
16
-
-
35048873815
-
-
Goi, B.M., Phan, R.C.W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of two anonymous buyerseller watermarking protocols and an improvement for true anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, 3089, pp. 369-382. Springer, Heidelberg (2004)
-
Goi, B.M., Phan, R.C.W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of two anonymous buyerseller watermarking protocols and an improvement for true anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 369-382. Springer, Heidelberg (2004)
-
-
-
-
17
-
-
35248849802
-
An anonymous buyer-seller watermarking protocol with anonymity control
-
Lee, P.J, Lim, C.H, eds, ICISC 2002, Springer, Heidelberg
-
Ju, H.S., Kim, H.J., Lee, D.H., Lim, J.I.: An anonymous buyer-seller watermarking protocol with anonymity control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421-432. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2587
, pp. 421-432
-
-
Ju, H.S.1
Kim, H.J.2
Lee, D.H.3
Lim, J.I.4
|