-
1
-
-
0001827537
-
-
Springer-Verlag, Berlin, Germany
-
Shamir A. An identity-based cryptosystems and signature schemes. Proceedings of Advances in Cryptology (CRYPTO'84), Aug 19-22, 1984, Santa Barbara, CA, USA (1984), Springer-Verlag, Berlin, Germany 47-53
-
(1984)
An identity-based cryptosystems and signature schemes. Proceedings of Advances in Cryptology (CRYPTO'84), Aug 19-22, 1984, Santa Barbara, CA, USA
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84874324906
-
-
Springer-Verlag, Berlin, Germany
-
Boneh D., and Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology (CRYPTO'01), Aug 19-23, 2001, Santa Barbara, CA, USA (2001), Springer-Verlag, Berlin, Germany 213-229
-
(2001)
Identity-based encryption from the weil pairing. Advances in Cryptology (CRYPTO'01), Aug 19-23, 2001, Santa Barbara, CA, USA
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
24144498013
-
-
Springer-Verlag, Berlin, Germany
-
Chen L., and Malone-Lee J. Improved identity-based signcryption. Public Key Cryptography-PKC2005 (LNCS 3386), Jan 26-28, Diablerets, Switzeland (2005), Springer-Verlag, Berlin, Germany 362-379
-
(2005)
Improved identity-based signcryption. Public Key Cryptography-PKC2005 (LNCS 3386), Jan 26-28, Diablerets, Switzeland
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
4
-
-
24144434019
-
-
Springer-Verlag, Berlin
-
Yuen T.H., and Wei V.K. Fast and proven secure blind identity-based signcryption from pairings. Topics in Cryptology-CT-RSA2005 (LNCS 3376), Feb 14-18, 2005, San Fransisco, CA. USA (2005), Springer-Verlag, Berlin 305-322
-
(2005)
Fast and proven secure blind identity-based signcryption from pairings. Topics in Cryptology-CT-RSA2005 (LNCS 3376), Feb 14-18, 2005, San Fransisco, CA. USA
, pp. 305-322
-
-
Yuen, T.H.1
Wei, V.K.2
-
5
-
-
33845540509
-
A survey of identity-based cryptography using pairing
-
(in Chinese).
-
Tian Y., Zhang Y.J., and Li Z.C. A survey of identity-based cryptography using pairing. Journal of Computer Research and Development 43 10 (2006) 1810-1819 (in Chinese).
-
(2006)
Journal of Computer Research and Development
, vol.43
, Issue.10
, pp. 1810-1819
-
-
Tian, Y.1
Zhang, Y.J.2
Li, Z.C.3
-
6
-
-
33750065099
-
Fingerprint-based identity authentication and digital media protection in network environment
-
Tian J., Li L., and Yang X. Fingerprint-based identity authentication and digital media protection in network environment. Journal of Computer Science and Technology 21 5 (2006) 861-870
-
(2006)
Journal of Computer Science and Technology
, vol.21
, Issue.5
, pp. 861-870
-
-
Tian, J.1
Li, L.2
Yang, X.3
-
7
-
-
84937704662
-
-
ACM, New York, NY, USA
-
Clancy T.C., Kiyavash N., and Lin D.J. Secure smart card-based fingerprint authentication. Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Application, Nov 2-8, 2003, Berkley CA, USA (2003), ACM, New York, NY, USA 45-52
-
(2003)
Secure smart card-based fingerprint authentication. Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Application, Nov 2-8, 2003, Berkley CA, USA
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
8
-
-
0036350106
-
-
Juels A, Sudan M. A fuzzy vault scheme. Proceedings IEEE International Symposium on Information Theory, Jun 30-Jul 5, 2002, Lausanne, Switzerland. 2002: 408-409.
-
Juels A, Sudan M. A fuzzy vault scheme. Proceedings IEEE International Symposium on Information Theory, Jun 30-Jul 5, 2002, Lausanne, Switzerland. 2002: 408-409.
-
-
-
-
9
-
-
26444525625
-
-
Spring, Berlin, Germany
-
Uludag U., Pankanti S., and Jain A.K. Fuzzy vault for fingerprints. Proceeding of International Conference on Audio- and Video- Based Biometric Person Authentication, Jul 20-22, 2003, Rye Brook, NY, USA (2005), Spring, Berlin, Germany 310-319
-
(2005)
Fuzzy vault for fingerprints. Proceeding of International Conference on Audio- and Video- Based Biometric Person Authentication, Jul 20-22, 2003, Rye Brook, NY, USA
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
11
-
-
35048865463
-
-
Springer-Verlag, Berlin, Germany
-
Dodis Y., Reyzin L., and Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceeding of Advances in Cryptology-Eurocrypt 2004 (LNCS 3027), May 2-6, 2004, Interlaken, Switzerland (2004), Springer-Verlag, Berlin, Germany 523-540
-
(2004)
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceeding of Advances in Cryptology-Eurocrypt 2004 (LNCS 3027), May 2-6, 2004, Interlaken, Switzerland
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
12
-
-
24944554962
-
-
Springer-Verlag, Berlin, Germany
-
Sahai A., and Waters B. Fuzzy identity-based encryption. Proceeding of Advances in Cryptology-Eurocrypt, May 22-26, 2005, Aarhus, Denmak (2005), Springer-Verlag, Berlin, Germany 457-473
-
(2005)
Fuzzy identity-based encryption. Proceeding of Advances in Cryptology-Eurocrypt, May 22-26, 2005, Aarhus, Denmak
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
13
-
-
12344259813
-
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
-
Jin A., Ling D.N.C., and Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37 11 (2004) 2245-2255
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.1
Ling, D.N.C.2
Goh, A.3
|