메뉴 건너뛰기




Volumn 4, Issue 1-2, 2009, Pages 27-42

Secure pairing with biometrics

Author keywords

Ad hoc authentication; Biometrics; Fuzzy extractors; Secure pairing

Indexed keywords

BIOMETRICS; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 61849134762     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.023424     Document Type: Article
Times cited : (17)

References (23)
  • 2
    • 50249159449 scopus 로고    scopus 로고
    • Comparing landmarking methods for face recognition
    • Veldhoven, The Netherlands, November, pp
    • Beumer, G.M., Tao, Q. and Veldhuis, R.N.J. (2005) 'Comparing landmarking methods for face recognition', Proc. ProRISC 2005 16th Annual Workshop, Veldhoven, The Netherlands, November, pp.594-597.
    • (2005) Proc. ProRISC 2005 16th Annual Workshop , pp. 594-597
    • Beumer, G.M.1    Tao, Q.2    Veldhuis, R.N.J.3
  • 5
    • 72849123651 scopus 로고    scopus 로고
    • Secure Ad-Hoc Pairing With Biometrics: Safe
    • Technical Report TR-CTIT-06-72, Enschede
    • Buhan, I., Doumen, J., Hartel, P. and Veldhuis, R. (2007b) Secure Ad-Hoc Pairing With Biometrics: Safe, Technical Report TR-CTIT-06-72, Enschede, http://eprints.eemcs.utwente.nl/10783.
    • (2007)
    • Buhan, I.1    Doumen, J.2    Hartel, P.3    Veldhuis, R.4
  • 7
    • 84958742278 scopus 로고    scopus 로고
    • Corin, R. and Etalle, S. (2002) 'An improved constraint-based system for the verification of security protocols', in Hermenegildo, M.V. and Puebla, G. (Eds.): SAS, 2477 of LNCS, Springer, pp.326-341.
    • Corin, R. and Etalle, S. (2002) 'An improved constraint-based system for the verification of security protocols', in Hermenegildo, M.V. and Puebla, G. (Eds.): SAS, Vol. 2477 of LNCS, Springer, pp.326-341.
  • 8
    • 35048865463 scopus 로고    scopus 로고
    • Dodis, Y., Reyzin, L. and Smith, A. (2004) 'Fuzzy extractors: How to generate strong keys from biometrics and other noisy data', in Cachin, C. and Camenisch, J. (Eds.): Advances in Cryptology - Eurocrypt 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May, Proceedings, 3027 of LNCS, Springer, pp.523-540.
    • Dodis, Y., Reyzin, L. and Smith, A. (2004) 'Fuzzy extractors: How to generate strong keys from biometrics and other noisy data', in Cachin, C. and Camenisch, J. (Eds.): Advances in Cryptology - Eurocrypt 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May, Proceedings, Volume 3027 of LNCS, Springer, pp.523-540.
  • 11
    • 0142156649 scopus 로고    scopus 로고
    • Secure spontaneous device association
    • Dey, A.K, Schmidt, A. and Mc-Carthy, J.F, Eds, Ubicomp, of, Springer, pp
    • Kindberg, T. and Zhang, K. (2003) 'Secure spontaneous device association', in Dey, A.K., Schmidt, A. and Mc-Carthy, J.F. (Eds.): Ubicomp, Volume 2864 of LNCS, Springer, pp.124-131.
    • (2003) LNCS , vol.2864 , pp. 124-131
    • Kindberg, T.1    Zhang, K.2
  • 12
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Kittler, J. and Nixon, M.S, Eds, AVBPA, of, Springer, pp
    • Linnartz, J. and Tuyls, P. (2003) 'New shielding functions to enhance privacy and prevent misuse of biometric templates', in Kittler, J. and Nixon, M.S. (Eds.): AVBPA, Volume 2688 of LNCS, Springer, pp.393-402.
    • (2003) LNCS , vol.2688 , pp. 393-402
    • Linnartz, J.1    Tuyls, P.2
  • 13
    • 38049075710 scopus 로고    scopus 로고
    • Shake well before use: Authentication based on accelerometer data
    • LaMarca, A, Langheinrich, M. and Truong, K.N, Eds, Pervasive, of, Springer, pp
    • Mayrhofer, R. and Gellersen, H. (2007) 'Shake well before use: authentication based on accelerometer data', in LaMarca, A., Langheinrich, M. and Truong, K.N. (Eds.): Pervasive, Volume 4480 of LNCS, Springer, pp.144-161.
    • (2007) LNCS , vol.4480 , pp. 144-161
    • Mayrhofer, R.1    Gellersen, H.2
  • 14
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • IEEE Computer Society, pp
    • McCune, J., Perrig, A. and Reiter, M. (2005) 'Seeing-is-believing: Using camera phones for human-verifiable authentication', IEEE Symposium on Security and Privacy, IEEE Computer Society, pp.110-124.
    • (2005) IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 17
    • 77953838402 scopus 로고    scopus 로고
    • Cracking the bluetooth pin
    • Shin, K.G, Kotz, D. and Noble, B.D, Eds, ACM, pp
    • Shaked, Y. and Wool, A. (2005) 'Cracking the bluetooth pin', in Shin, K.G., Kotz, D. and Noble, B.D. (Eds.): MobiSys, ACM, pp.39-50.
    • (2005) MobiSys , pp. 39-50
    • Shaked, Y.1    Wool, A.2
  • 18
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Christianson, B, Crispo, B, Malcolm, J.A. and Roe, M, Eds, Security Protocols Workshop, of, Springer, pp
    • Stajano, F. and Anderson, R. (1999) 'The resurrecting duckling: Security issues for ad-hoc wireless networks', in Christianson, B., Crispo, B., Malcolm, J.A. and Roe, M. (Eds.): Security Protocols Workshop, Volume 1796 of LNCS, Springer, pp.172-194.
    • (1999) LNCS , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 19
    • 26444507172 scopus 로고    scopus 로고
    • Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A. and Veldhuis, R. (2005) 'Practical biometric authentication with template protection', in Kanade, T., Jain, A.K. and Ratha, N.K. (Eds.): AVBPA, 3546 of LNCS, Springer, pp.436-446.
    • Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A. and Veldhuis, R. (2005) 'Practical biometric authentication with template protection', in Kanade, T., Jain, A.K. and Ratha, N.K. (Eds.): AVBPA, Volume 3546 of LNCS, Springer, pp.436-446.
  • 20
    • 61849148607 scopus 로고    scopus 로고
    • Usability Analysis of Secure Pairing Methods
    • Technical Report, NRCTR-2007-002, Nokia Research Center
    • Uzun, E., Karvonen, K. and Asokan, N. (2007) Usability Analysis of Secure Pairing Methods, Technical Report, NRCTR-2007-002, Nokia Research Center.
    • (2007)
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 21
    • 8844254687 scopus 로고    scopus 로고
    • Veldhuis, R., Bazen, A., Kauffman, J. and Hartel, P. (2004) 'Biometric verification based on grip-pattern recognition', Security, Steganography, and Watermarking of Multimedia Contents VI, January 18-22, 2004, Proceedings, 5306 of Proceedings of SPIE, San Jose, California USA, SPIE, pp.634-641.
    • Veldhuis, R., Bazen, A., Kauffman, J. and Hartel, P. (2004) 'Biometric verification based on grip-pattern recognition', Security, Steganography, and Watermarking of Multimedia Contents VI, January 18-22, 2004, Proceedings, Volume 5306 of Proceedings of SPIE, San Jose, California USA, SPIE, pp.634-641.
  • 22
    • 0035680116 scopus 로고    scopus 로고
    • Rapid object detection using a boosted cascade of simple features
    • Viola, P.A. and Jones, M.J. (2001) 'Rapid object detection using a boosted cascade of simple features', CVPR, IEEE Computer Society, Vol. 1, pp.511-518.
    • (2001) CVPR, IEEE Computer Society , vol.1 , pp. 511-518
    • Viola, P.A.1    Jones, M.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.