메뉴 건너뛰기




Volumn , Issue , 2008, Pages 130-139

Privacy-aware biometrics: Design and implementation of a multimodal verification system

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATIONS; AUTHENTICATION; CRYPTOGRAPHY; SECURITY SYSTEMS;

EID: 60649105959     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.13     Document Type: Conference Paper
Times cited : (58)

References (28)
  • 2
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • R. Cramer, editor, Advances in Cryptology EUROCRYPT 2005, of, Springer-Verlag
    • X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith. Secure remote authentication using biometric data. In R. Cramer, editor, Advances in Cryptology (EUROCRYPT 2005), volume 3494 of Lecture Notes in Computer Science. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 3
    • 38149070898 scopus 로고    scopus 로고
    • An application of the goldwasser-micali cryptosystem to biometric authentication
    • Proc. of the 12th Australasian Conference on Information Security and Privacy ACISP'07, of, Springer-Verlag
    • J. Bringer, H. Chabanne, G. Cohen, B. Kindari, and G. Zemor. An application of the goldwasser-micali cryptosystem to biometric authentication. In Proc. of the 12th Australasian Conference on Information Security and Privacy (ACISP'07), volume 4586 of Lecture Notes in Computer Science, pages 96-106. Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4586 , pp. 96-106
    • Bringer, J.1    Chabanne, H.2    Cohen, G.3    Kindari, B.4    Zemor, G.5
  • 6
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical indenpendence
    • J. G. Daugman. High confidence visual recognition of persons by a test of statistical indenpendence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15:1148-1161, 1993.
    • (1993) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.15 , pp. 1148-1161
    • Daugman, J.G.1
  • 7
    • 36348947793 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Technical Report 2006/235, Cryptology Eprint Archive, 2006
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Technical Report 2006/235, Cryptology Eprint Archive, 2006.
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 8
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • C. Cachin and J. Camenisch, editors, Advances in Cryptology EUROCRYPT 2004, of, Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch, editors, Advances in Cryptology (EUROCRYPT 2004), volume 3027 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 9
    • 78651590286 scopus 로고    scopus 로고
    • Fuzzy extractors
    • P. Tuyls and J. Goseling, editors, chapter 5, Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors. In P. Tuyls and J. Goseling, editors, Security with Noisy Data, chapter 5, pages 93-111. Springer-Verlag, 2007.
    • (2007) Security with Noisy Data , pp. 93-111
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 11
    • 9144235589 scopus 로고    scopus 로고
    • Towards a VLSI architecture for interpolation-based soft-decision Reed-Solomon decoders
    • W. J. Gross, F. R. Kschischang, R. Koetter, and P. G. Gulak. Towards a VLSI architecture for interpolation-based soft-decision Reed-Solomon decoders. The Journal of VLSI Signal Processing, 39(1-2):93-111, 2005.
    • (2005) The Journal of VLSI Signal Processing , vol.39 , Issue.1-2 , pp. 93-111
    • Gross, W.J.1    Kschischang, F.R.2    Koetter, R.3    Gulak, P.G.4
  • 12
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometry codes
    • V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Trans. Inf. Theory, 45(6):1757-1767, 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 13
    • 33750918446 scopus 로고    scopus 로고
    • Combining cryptography with biometrics effectively
    • Technical Report UCAMCL-TR-640, University of Cambridge, Computer Laboratory, United Kingdom, July
    • F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics effectively. Technical Report UCAMCL-TR-640, University of Cambridge, Computer Laboratory, United Kingdom, July 2005.
    • (2005)
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 18
    • 0345306775 scopus 로고    scopus 로고
    • Algebraic soft-decision decoding of Reed-Solomon codes
    • R. Koetter and A. Vardy. Algebraic soft-decision decoding of Reed-Solomon codes. IEEE Trans. Inf. Theory, 49(11):2809-2825, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.11 , pp. 2809-2825
    • Koetter, R.1    Vardy, A.2
  • 20
    • 33750533142 scopus 로고    scopus 로고
    • An improved biohashing for human authentication
    • A. Lumini and L. Nanni. An improved biohashing for human authentication. Pattern Recognition, 40(3):1057-1065, 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 22
    • 41149102471 scopus 로고    scopus 로고
    • MATLAB source code for a biometric identification system based on iris patterns
    • The University of Western Australia
    • L. Masek and P. Kovesi. MATLAB source code for a biometric identification system based on iris patterns. The School of Computer Science and Software Engineering, The University of Western Australia, 2003.
    • (2003) The School of Computer Science and Software Engineering
    • Masek, L.1    Kovesi, P.2
  • 24
    • 85024264226 scopus 로고    scopus 로고
    • Biometrics: Uses and abuses
    • Aug
    • B. Schneier. Biometrics: uses and abuses. Commun. ACM, 42(8):136, Aug. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.8 , pp. 136
    • Schneier, B.1
  • 28
    • 60649116018 scopus 로고    scopus 로고
    • C. I. Watson, M. D. Garris, E. Tabassi, C. L. Wilson, R. M. McCabe, S. Janet, and K. Ko. User's Guide to NIST Biometric Image Software (NBIS). (formerly NISTIR 6813), 2007.
    • C. I. Watson, M. D. Garris, E. Tabassi, C. L. Wilson, R. M. McCabe, S. Janet, and K. Ko. User's Guide to NIST Biometric Image Software (NBIS). (formerly NISTIR 6813), 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.