메뉴 건너뛰기




Volumn , Issue , 2008, Pages 850-857

Privacy leakage in biometric secrecy systems

Author keywords

[No Author keywords available]

Indexed keywords

ACHIEVABLE RATES; AMOUNT OF INFORMATIONS; AUTHENTICATION DATUM; BIOMETRIC DATUM; MUTUAL INFORMATIONS; PRIVATE KEYS; SECRET KEYS; SECRET SHARING; SOURCE MODELS; TWO SOURCES;

EID: 64549142823     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ALLERTON.2008.4797646     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 1
    • 0027629488 scopus 로고
    • Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing
    • July
    • R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing," IEEE Trans. Inform. Theory, vol. IT-39, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.IT-39 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 2
    • 0031701886 scopus 로고    scopus 로고
    • Common Randomness in Information Theory and Cryptography - Part II: CR Capacity
    • January
    • R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part II: CR Capacity," IEEE Trans. Inform. Theory, vol. IT-44, pp. 225-240, January 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.IT-44 , pp. 225-240
    • Ahlswede, R.1    Csiszar, I.2
  • 3
    • 0016486048 scopus 로고
    • A Proof of the Data Compression Theorem of Slepain and Wolf for Ergodic Sources
    • March
    • T. M. Cover, "A Proof of the Data Compression Theorem of Slepain and Wolf for Ergodic Sources," IEEE Trans. Inform. Theory, vol. IT-22, pp. 226-228, March 1975.
    • (1975) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 226-228
    • Cover, T.M.1
  • 4
    • 0017973511 scopus 로고
    • Broadcast Channels with Confidential Messages
    • May
    • I. Csiszar and J. Korner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inform. Th., Vol. IT - 24, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Th , vol.IT - 24 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 5
    • 0033891095 scopus 로고    scopus 로고
    • Common Randomnness and Secret Key Generation with a Helper
    • March
    • I. Csiszar and P. Narayan, "Common Randomnness and Secret Key Generation with a Helper," IEEE Trans. Inform. Theory, vol. IT-46, pp. 344-366, March 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.IT-46 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 7
    • 34547531639 scopus 로고    scopus 로고
    • On the Security of the XOR-Method in Biometric Authentication Systems
    • Noordwijk, The Netherlands, June 8-9
    • T. Ignatenko and F. Willems, "On the Security of the XOR-Method in Biometric Authentication Systems," Proc. 27th Symp. Inform. Theory Benelux, Noordwijk, The Netherlands, June 8-9, 2006, pp. 197-204.
    • (2006) Proc. 27th Symp. Inform. Theory Benelux , pp. 197-204
    • Ignatenko, T.1    Willems, F.2
  • 9
    • 0027599802 scopus 로고
    • Secret Key Agreement by Public Discussion from Common Information
    • U. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Inform. Theory, IT-39, pp. 733-742, 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.IT-39 , pp. 733-742
    • Maurer, U.1
  • 10
    • 46749089666 scopus 로고    scopus 로고
    • On Secure Distributed Source Coding
    • Lake Tahoe, California, Sept. 2-6
    • V. Prabhakaran and K. Ramchandran, "On Secure Distributed Source Coding," Proc. IEEE Inform. Theory Workshop, Lake Tahoe, California, Sept. 2-6, 2007, pp. 442-447.
    • (2007) Proc. IEEE Inform. Theory Workshop , pp. 442-447
    • Prabhakaran, V.1    Ramchandran, K.2
  • 12
    • 0031647696 scopus 로고    scopus 로고
    • The Common Randomness Capacity of a Pair of Independent Discrete Memoryless Channels
    • January
    • S. Venkatesan and V. Anantharam, "The Common Randomness Capacity of a Pair of Independent Discrete Memoryless Channels," IEEE Trans. Inform. Theory, vol. IT-44, pp. 215-224, January 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.IT-44 , pp. 215-224
    • Venkatesan, S.1    Anantharam, V.2
  • 13
    • 0015681689 scopus 로고    scopus 로고
    • A. D. Wyner and J. Ziv, A Theorem on the Entropy of Certain Binary Sequences and Application: Part I, IEEE Trans. Inform. Th., V o l. I T - 19, No. 6, pp. 769-773, November 1973.
    • A. D. Wyner and J. Ziv, "A Theorem on the Entropy of Certain Binary Sequences and Application: Part I," IEEE Trans. Inform. Th., V o l. I T - 19, No. 6, pp. 769-773, November 1973.
  • 14
    • 0016882596 scopus 로고
    • The Rate-Distortion Function for Source Coding with Side Information at the Decoder
    • January
    • A. D. Wyner and J. Ziv, "The Rate-Distortion Function for Source Coding with Side Information at the Decoder," IEEE Trans. Inform. Th., Vol. IT - 22, No. 1, pp. 1-10, January 1976.
    • (1976) IEEE Trans. Inform. Th , vol.IT - 22 , Issue.1 , pp. 1-10
    • Wyner, A.D.1    Ziv, J.2
  • 15
    • 33749443558 scopus 로고    scopus 로고
    • Secret and Private Key Constructions for Simple Multiterminal Source Models
    • Adelaide, Australia, Sept. 4-9
    • Chunxuan Ye and P. Narayan, "Secret and Private Key Constructions for Simple Multiterminal Source Models," Proc. IEEE Int. Symp. Inform. Theory, Adelaide, Australia, Sept. 4-9, 2005, pp. 2138-2141.
    • (2005) Proc. IEEE Int. Symp. Inform. Theory , pp. 2138-2141
    • Ye, C.1    Narayan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.