-
1
-
-
33947492044
-
From template to image: Reconstructing fingerprints from minutiae points
-
Apr
-
A. Ross, J. Shah, and A. Jain, "From template to image: Reconstructing fingerprints from minutiae points," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, pp. 544-560, Apr. 2007.
-
(2007)
IEEE Trans. on Pattern Analysis and Machine Intelligence
, vol.29
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.3
-
2
-
-
0036350106
-
A fuzzy vault scheme
-
Lausanne, Switzerland, pp, June-July
-
A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Intl. Symposium on Information Theory, (Lausanne, Switzerland), pp. 293-297, June-July 2002.
-
(2002)
Proc. IEEE Intl. Symposium on Information Theory
, pp. 293-297
-
-
Juels, A.1
Sudan, M.2
-
3
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sept
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics and Security, vol. 2, pp. 503-512, Sept. 2007.
-
(2007)
IEEE Trans. Inf. Forensics and Security
, vol.2
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
5
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Honolulu, HI, pp, Apr
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. Yedidia, "Using distributed source coding to secure fingerprint biometrics," in Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Honolulu, HI), pp. 129-132, Apr. 2007.
-
(2007)
Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing
, pp. 129-132
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.5
-
7
-
-
34547512629
-
On privacy in secure biometrics authentication systems
-
Honolulu, HI, pp, Apr
-
T. Ignatenko and F. Willems, "On privacy in secure biometrics authentication systems," in Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Honolulu, HI), pp. 121-124, Apr. 2007.
-
(2007)
Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing
, pp. 121-124
-
-
Ignatenko, T.1
Willems, F.2
-
8
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
10
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.M.1
-
11
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
12
-
-
0031701886
-
Common randomness in information theory and cryptography, Part II: CR capacity
-
Jan
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, pp. 225-240
-
-
Ahlswede, R.1
Csiszar, I.2
-
14
-
-
0006932810
-
Common information is far less than mutual information
-
P. Gacs and J. Korner, "Common information is far less than mutual information," Problems of Control and Information Theory, vol. 2, pp. 149-162, 1973.
-
(1973)
Problems of Control and Information Theory
, vol.2
, pp. 149-162
-
-
Gacs, P.1
Korner, J.2
|