-
1
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
The Internet Society, Reston, Virginia, San Diego, California
-
Balfanz, D., Smetters, D.K., Stewart, P. and Wong, H.C. (2002) 'Talking to strangers: Authentication in ad-hoc wireless networks', Network and Distributed Systems Security Symposium (NDSS), The Internet Society, Reston, Virginia, San Diego, California.
-
(2002)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
2
-
-
50249159449
-
Comparing landmarking methods for face recognition
-
Veldhoven, The Netherlands, November, pp
-
Beumer, G.M., Tao, Q. and Veldhuis, R.N.J. (2005) 'Comparing landmarking methods for face recognition', Proc. ProRISC 2005 16th Annual Workshop, Veldhoven, The Netherlands, November, pp.594-597.
-
(2005)
Proc. ProRISC 2005 16th Annual Workshop
, pp. 594-597
-
-
Beumer, G.M.1
Tao, Q.2
Veldhuis, R.N.J.3
-
3
-
-
34547222690
-
The effect of image resolution on the performance of a face recognition system
-
Boom, B.J, Beumer, G.M., Spreeuwers, L.J. and Veldhuis, R.N.J. (2006) 'The effect of image resolution on the performance of a face recognition system', ICARCV '06, 9th International Conference on Control, Automation, Robotics and Vision, pp.1-6.
-
(2006)
ICARCV '06, 9th International Conference on Control, Automation, Robotics and Vision
, pp. 1-6
-
-
Boom, B.J.1
Beumer, G.M.2
Spreeuwers, L.J.3
Veldhuis, R.N.J.4
-
4
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
Deng, R. and Samarati, P, Eds, Singapore, ACM, New York, pp
-
Buhan, I., Doumen, J., Hartel, P. and Veldhuis, R. (2007a) 'Fuzzy extractors for continuous distributions', in Deng, R. and Samarati, P. (Eds.): Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, ACM, New York, pp.353-355.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 353-355
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
5
-
-
72849123651
-
Secure Ad-Hoc Pairing With Biometrics: Safe
-
Technical Report TR-CTIT-06-72, Enschede
-
Buhan, I., Doumen, J., Hartel, P. and Veldhuis, R. (2007b) Secure Ad-Hoc Pairing With Biometrics: Safe, Technical Report TR-CTIT-06-72, Enschede, http://eprints.eemcs.utwente.nl/10783.
-
(2007)
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
6
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
IEEE, pp
-
Chang, Y., Zhang, W. and Chen, T. (2004) 'Biometrics-based cryptographic key generation', International Conference on Multimedia and Expo (ICME), IEEE, pp.2203-2206.
-
(2004)
International Conference on Multimedia and Expo (ICME)
, pp. 2203-2206
-
-
Chang, Y.1
Zhang, W.2
Chen, T.3
-
7
-
-
84958742278
-
-
Corin, R. and Etalle, S. (2002) 'An improved constraint-based system for the verification of security protocols', in Hermenegildo, M.V. and Puebla, G. (Eds.): SAS, 2477 of LNCS, Springer, pp.326-341.
-
Corin, R. and Etalle, S. (2002) 'An improved constraint-based system for the verification of security protocols', in Hermenegildo, M.V. and Puebla, G. (Eds.): SAS, Vol. 2477 of LNCS, Springer, pp.326-341.
-
-
-
-
8
-
-
35048865463
-
-
Dodis, Y., Reyzin, L. and Smith, A. (2004) 'Fuzzy extractors: How to generate strong keys from biometrics and other noisy data', in Cachin, C. and Camenisch, J. (Eds.): Advances in Cryptology - Eurocrypt 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May, Proceedings, 3027 of LNCS, Springer, pp.523-540.
-
Dodis, Y., Reyzin, L. and Smith, A. (2004) 'Fuzzy extractors: How to generate strong keys from biometrics and other noisy data', in Cachin, C. and Camenisch, J. (Eds.): Advances in Cryptology - Eurocrypt 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May, Proceedings, Volume 3027 of LNCS, Springer, pp.523-540.
-
-
-
-
9
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D. and Yao, A. (1983) 'On the security of public key protocols', Information Theory, IEEE Transactions on, Vol. 29, pp.198-208.
-
(1983)
Information Theory, IEEE Transactions on
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
10
-
-
33947635594
-
Loud and clear: Human-verifiable authentication based on audio
-
IEEE Computer Society, 4-7 July, Lisboa, Portugal, p
-
Goodrich, M., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. (2006) 'Loud and clear: Human-verifiable authentication based on audio', 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), IEEE Computer Society, 4-7 July 2006, Lisboa, Portugal, p.10.
-
(2006)
26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006)
, pp. 10
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Tsudik, G.4
Uzun, E.5
-
11
-
-
0142156649
-
Secure spontaneous device association
-
Dey, A.K, Schmidt, A. and Mc-Carthy, J.F, Eds, Ubicomp, of, Springer, pp
-
Kindberg, T. and Zhang, K. (2003) 'Secure spontaneous device association', in Dey, A.K., Schmidt, A. and Mc-Carthy, J.F. (Eds.): Ubicomp, Volume 2864 of LNCS, Springer, pp.124-131.
-
(2003)
LNCS
, vol.2864
, pp. 124-131
-
-
Kindberg, T.1
Zhang, K.2
-
12
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Kittler, J. and Nixon, M.S, Eds, AVBPA, of, Springer, pp
-
Linnartz, J. and Tuyls, P. (2003) 'New shielding functions to enhance privacy and prevent misuse of biometric templates', in Kittler, J. and Nixon, M.S. (Eds.): AVBPA, Volume 2688 of LNCS, Springer, pp.393-402.
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.1
Tuyls, P.2
-
13
-
-
38049075710
-
Shake well before use: Authentication based on accelerometer data
-
LaMarca, A, Langheinrich, M. and Truong, K.N, Eds, Pervasive, of, Springer, pp
-
Mayrhofer, R. and Gellersen, H. (2007) 'Shake well before use: authentication based on accelerometer data', in LaMarca, A., Langheinrich, M. and Truong, K.N. (Eds.): Pervasive, Volume 4480 of LNCS, Springer, pp.144-161.
-
(2007)
LNCS
, vol.4480
, pp. 144-161
-
-
Mayrhofer, R.1
Gellersen, H.2
-
14
-
-
27544489075
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
IEEE Computer Society, pp
-
McCune, J., Perrig, A. and Reiter, M. (2005) 'Seeing-is-believing: Using camera phones for human-verifiable authentication', IEEE Symposium on Security and Privacy, IEEE Computer Society, pp.110-124.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 110-124
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
16
-
-
33751023773
-
Secure device pairing based on a visual channel (short paper)
-
Saxena, N., Ekberg, J., Kostiainen, K. and Asokan, N. (2006) 'Secure device pairing based on a visual channel (short paper)', S&P, IEEE Computer Society, pp.306-313.
-
(2006)
S&P, IEEE Computer Society
, pp. 306-313
-
-
Saxena, N.1
Ekberg, J.2
Kostiainen, K.3
Asokan, N.4
-
17
-
-
77953838402
-
Cracking the bluetooth pin
-
Shin, K.G, Kotz, D. and Noble, B.D, Eds, ACM, pp
-
Shaked, Y. and Wool, A. (2005) 'Cracking the bluetooth pin', in Shin, K.G., Kotz, D. and Noble, B.D. (Eds.): MobiSys, ACM, pp.39-50.
-
(2005)
MobiSys
, pp. 39-50
-
-
Shaked, Y.1
Wool, A.2
-
18
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Christianson, B, Crispo, B, Malcolm, J.A. and Roe, M, Eds, Security Protocols Workshop, of, Springer, pp
-
Stajano, F. and Anderson, R. (1999) 'The resurrecting duckling: Security issues for ad-hoc wireless networks', in Christianson, B., Crispo, B., Malcolm, J.A. and Roe, M. (Eds.): Security Protocols Workshop, Volume 1796 of LNCS, Springer, pp.172-194.
-
(1999)
LNCS
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
19
-
-
26444507172
-
-
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A. and Veldhuis, R. (2005) 'Practical biometric authentication with template protection', in Kanade, T., Jain, A.K. and Ratha, N.K. (Eds.): AVBPA, 3546 of LNCS, Springer, pp.436-446.
-
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A. and Veldhuis, R. (2005) 'Practical biometric authentication with template protection', in Kanade, T., Jain, A.K. and Ratha, N.K. (Eds.): AVBPA, Volume 3546 of LNCS, Springer, pp.436-446.
-
-
-
-
20
-
-
61849148607
-
Usability Analysis of Secure Pairing Methods
-
Technical Report, NRCTR-2007-002, Nokia Research Center
-
Uzun, E., Karvonen, K. and Asokan, N. (2007) Usability Analysis of Secure Pairing Methods, Technical Report, NRCTR-2007-002, Nokia Research Center.
-
(2007)
-
-
Uzun, E.1
Karvonen, K.2
Asokan, N.3
-
21
-
-
8844254687
-
-
Veldhuis, R., Bazen, A., Kauffman, J. and Hartel, P. (2004) 'Biometric verification based on grip-pattern recognition', Security, Steganography, and Watermarking of Multimedia Contents VI, January 18-22, 2004, Proceedings, 5306 of Proceedings of SPIE, San Jose, California USA, SPIE, pp.634-641.
-
Veldhuis, R., Bazen, A., Kauffman, J. and Hartel, P. (2004) 'Biometric verification based on grip-pattern recognition', Security, Steganography, and Watermarking of Multimedia Contents VI, January 18-22, 2004, Proceedings, Volume 5306 of Proceedings of SPIE, San Jose, California USA, SPIE, pp.634-641.
-
-
-
-
22
-
-
0035680116
-
Rapid object detection using a boosted cascade of simple features
-
Viola, P.A. and Jones, M.J. (2001) 'Rapid object detection using a boosted cascade of simple features', CVPR, IEEE Computer Society, Vol. 1, pp.511-518.
-
(2001)
CVPR, IEEE Computer Society
, vol.1
, pp. 511-518
-
-
Viola, P.A.1
Jones, M.J.2
-
23
-
-
85180527787
-
The secure remote password protocol
-
The Internet Society, San Diego, California, USA, paper 3
-
Wu, T.D. (1998) 'The secure remote password protocol', Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, The Internet Society, San Diego, California, USA, paper 3.
-
(1998)
Proceedings of the Network and Distributed System Security Symposium, NDSS 1998
-
-
Wu, T.D.1
|