-
2
-
-
24944501364
-
Secure remote authentication using biometric data
-
R. Cramer, editor, Advances in Cryptology EUROCRYPT 2005, of, Springer-Verlag
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith. Secure remote authentication using biometric data. In R. Cramer, editor, Advances in Cryptology (EUROCRYPT 2005), volume 3494 of Lecture Notes in Computer Science. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
3
-
-
38149070898
-
An application of the goldwasser-micali cryptosystem to biometric authentication
-
Proc. of the 12th Australasian Conference on Information Security and Privacy ACISP'07, of, Springer-Verlag
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindari, and G. Zemor. An application of the goldwasser-micali cryptosystem to biometric authentication. In Proc. of the 12th Australasian Conference on Information Security and Privacy (ACISP'07), volume 4586 of Lecture Notes in Computer Science, pages 96-106. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4586
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindari, B.4
Zemor, G.5
-
4
-
-
60649093253
-
Optimal iris fuzzy sketches
-
abs/0705.3740
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor. Optimal iris fuzzy sketches. The Computing Research Repository, abs/0705.3740, 2007.
-
(2007)
The Computing Research Repository
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
6
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical indenpendence
-
J. G. Daugman. High confidence visual recognition of persons by a test of statistical indenpendence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15:1148-1161, 1993.
-
(1993)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.15
, pp. 1148-1161
-
-
Daugman, J.G.1
-
7
-
-
36348947793
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Technical Report 2006/235, Cryptology Eprint Archive, 2006
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Technical Report 2006/235, Cryptology Eprint Archive, 2006.
-
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology EUROCRYPT 2004, of, Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch, editors, Advances in Cryptology (EUROCRYPT 2004), volume 3027 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
78651590286
-
Fuzzy extractors
-
P. Tuyls and J. Goseling, editors, chapter 5, Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors. In P. Tuyls and J. Goseling, editors, Security with Noisy Data, chapter 5, pages 93-111. Springer-Verlag, 2007.
-
(2007)
Security with Noisy Data
, pp. 93-111
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
11
-
-
9144235589
-
Towards a VLSI architecture for interpolation-based soft-decision Reed-Solomon decoders
-
W. J. Gross, F. R. Kschischang, R. Koetter, and P. G. Gulak. Towards a VLSI architecture for interpolation-based soft-decision Reed-Solomon decoders. The Journal of VLSI Signal Processing, 39(1-2):93-111, 2005.
-
(2005)
The Journal of VLSI Signal Processing
, vol.39
, Issue.1-2
, pp. 93-111
-
-
Gross, W.J.1
Kschischang, F.R.2
Koetter, R.3
Gulak, P.G.4
-
12
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Trans. Inf. Theory, 45(6):1757-1767, 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami, V.1
Sudan, M.2
-
13
-
-
33750918446
-
Combining cryptography with biometrics effectively
-
Technical Report UCAMCL-TR-640, University of Cambridge, Computer Laboratory, United Kingdom, July
-
F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics effectively. Technical Report UCAMCL-TR-640, University of Cambridge, Computer Laboratory, United Kingdom, July 2005.
-
(2005)
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
14
-
-
33744779400
-
Biometrics: A tool for information security
-
June
-
A. K. Jain, A. Ross, and S. Pankanti. Biometrics: A tool for information security. IEEE transactions on information forensics and security, 1(2):125-143, June 2006.
-
(2006)
IEEE transactions on information forensics and security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
15
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth and E. Teletar, editors, IEEE Press
-
A. Juels and M. Sudan. A fuzzy vault scheme. In A. Lapidoth and E. Teletar, editors, Proceedings of the IEEE International Symposium on Information Theory, 2002, page 408. IEEE Press, 2002.
-
(2002)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
16
-
-
0033281339
-
A fuzzy commitment scheme
-
New York, NY, USA, ACM Press
-
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proceedings of the 6th ACM conference on Computer and communications security (CCS '99), pages 28-36, New York, NY, USA, 1999. ACM Press.
-
(1999)
Proceedings of the 6th ACM conference on Computer and communications security (CCS '99)
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
18
-
-
0345306775
-
Algebraic soft-decision decoding of Reed-Solomon codes
-
R. Koetter and A. Vardy. Algebraic soft-decision decoding of Reed-Solomon codes. IEEE Trans. Inf. Theory, 49(11):2809-2825, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.11
, pp. 2809-2825
-
-
Koetter, R.1
Vardy, A.2
-
19
-
-
33646095185
-
An analysis of biohashing and its variants
-
A. W.-K. Kong, K. H. Cheung, D. Zhang, M. S. Kamel, and J. You. An analysis of biohashing and its variants. Pattern Recognition, 39(7):1359-1368, 2006.
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.W.-K.1
Cheung, K.H.2
Zhang, D.3
Kamel, M.S.4
You, J.5
-
20
-
-
33750533142
-
An improved biohashing for human authentication
-
A. Lumini and L. Nanni. An improved biohashing for human authentication. Pattern Recognition, 40(3):1057-1065, 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
21
-
-
0036522407
-
FVC2000: Fingerprint verification competition
-
D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain. FVC2000: Fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(3):402-412, 2002.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
22
-
-
41149102471
-
MATLAB source code for a biometric identification system based on iris patterns
-
The University of Western Australia
-
L. Masek and P. Kovesi. MATLAB source code for a biometric identification system based on iris patterns. The School of Computer Science and Software Engineering, The University of Western Australia, 2003.
-
(2003)
The School of Computer Science and Software Engineering
-
-
Masek, L.1
Kovesi, P.2
-
23
-
-
33744729468
-
Handbook of Multibiometrics
-
Springer-Verlag New York, Inc, Secaucus, NJ, USA
-
A. Ross, K. Nandakumar, and A. K. Jain. Handbook of Multibiometrics (International Series on Biometrics). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006.
-
(2006)
International Series on Biometrics
-
-
Ross, A.1
Nandakumar, K.2
Jain, A.K.3
-
24
-
-
85024264226
-
Biometrics: Uses and abuses
-
Aug
-
B. Schneier. Biometrics: uses and abuses. Commun. ACM, 42(8):136, Aug. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.8
, pp. 136
-
-
Schneier, B.1
-
27
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain. Biometric cryptosystems: Issues and challenges. In Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, volume 92, pages 948-960, June 2004.
-
(2004)
Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management
, vol.92
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.4
-
28
-
-
60649116018
-
-
C. I. Watson, M. D. Garris, E. Tabassi, C. L. Wilson, R. M. McCabe, S. Janet, and K. Ko. User's Guide to NIST Biometric Image Software (NBIS). (formerly NISTIR 6813), 2007.
-
C. I. Watson, M. D. Garris, E. Tabassi, C. L. Wilson, R. M. McCabe, S. Janet, and K. Ko. User's Guide to NIST Biometric Image Software (NBIS). (formerly NISTIR 6813), 2007.
-
-
-
|