-
2
-
-
84957619091
-
Authentication, enhanced security and error correcting codes
-
Proceedings of Crypto'98, Santa Barbara, USA, Springer-Verlag
-
Y. Aumann, and M. Rabin, "Authentication, enhanced security and error correcting codes", Proceedings of Crypto'98, Santa Barbara, USA, LNCS Springer-Verlag, vol. 1462, 1998, pp. 299-303.
-
(1998)
LNCS
, vol.1462
, pp. 299-303
-
-
Aumann, Y.1
Rabin, M.2
-
3
-
-
67549089004
-
-
th birthday, 1998, online available at http://www.cs.cityu.edu.hk/dept/video.html.
-
th birthday, 1998, online available at http://www.cs.cityu.edu.hk/dept/video.html.
-
-
-
-
4
-
-
0035268154
-
Deniable authentication protocols
-
X. Deng, C.H. Lee, and H. Zhu, "Deniable authentication protocols", IEE Proceedings Computers and Digital Techniques, vol. 148, pp. 101-4, 2001.
-
(2001)
IEE Proceedings Computers and Digital Techniques
, vol.148
, pp. 101-104
-
-
Deng, X.1
Lee, C.H.2
Zhu, H.3
-
5
-
-
0037019232
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
L. Fan, C.X. Xu, and J.H. Li, "Deniable authentication protocol based on Diffie-Hellman algorithm", Electronics Letters, vol. 38, pp. 705-6, 2002.
-
(2002)
Electronics Letters
, vol.38
, pp. 705-706
-
-
Fan, L.1
Xu, C.X.2
Li, J.H.3
-
6
-
-
2342455866
-
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
-
Z. Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme", Computer Standards and Interfaces, vol. 26, pp. 449-54, 2004.
-
(2004)
Computer Standards and Interfaces
, vol.26
, pp. 449-454
-
-
Shao, Z.1
-
7
-
-
24944490931
-
-
E.J. Yoon, E.K. Ryu, and K.Y. Yoo, Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm, Applied Mathematics and Computation, 167, pp. 247-80, 2005.
-
E.J. Yoon, E.K. Ryu, and K.Y. Yoo, "Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm", Applied Mathematics and Computation, vol. 167, pp. 247-80, 2005.
-
-
-
-
8
-
-
14844309431
-
Non-interactive deniable authentication protocol based on factoring
-
R. Lu, and Z. Cao, "Non-interactive deniable authentication protocol based on factoring", Computer Standards and Interfaces, vol. 27, 401-5, 2005.
-
(2005)
Computer Standards and Interfaces
, vol.27
, pp. 401-405
-
-
Lu, R.1
Cao, Z.2
-
9
-
-
26044448602
-
A new deniable authentication protocol from bilinear pairings
-
R. Lu, and Z. Cao, "A new deniable authentication protocol from bilinear pairings", Applied Mathematics and Computation, vol. 168, 954-61, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.168
, pp. 954-961
-
-
Lu, R.1
Cao, Z.2
-
10
-
-
15544375802
-
Identity-based deniable authentication protocol
-
Y. Shi, and J. Li, "Identity-based deniable authentication protocol", IEE Electronics Letters, vol. 41, pp. 241-2, 2005.
-
(2005)
IEE Electronics Letters
, vol.41
, pp. 241-242
-
-
Shi, Y.1
Li, J.2
-
11
-
-
33845950814
-
A novel deniable authentication protocol using generalized ElGamal signature scheme
-
W.B. Lee, C.C. Wu, and W.J. Tsaur, "A novel deniable authentication protocol using generalized ElGamal signature scheme", Information Sciences, vol. 77, pp. 1376-81, 2007.
-
(2007)
Information Sciences
, vol.77
, pp. 1376-1381
-
-
Lee, W.B.1
Wu, C.C.2
Tsaur, W.J.3
-
12
-
-
43949116287
-
Biometric Template Security
-
A.K. Jain, K. Nandakumar, and A. Nagar, "Biometric Template Security," EURASIP Journal on Advances in Signal Processing, vol. 2008, pp. 1-17, 2008.
-
(2008)
EURASIP Journal on Advances in Signal Processing
, vol.2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
13
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
J.K. Lee, S.R. Ryu, and K.Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards", IEE Electronics Letters, vol. 38, pp. 554-5, 2002.
-
(2002)
IEE Electronics Letters
, vol.38
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
14
-
-
15544370112
-
Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
-
W.C. Ku, S.T. Chang, and M.H. Chiang, "Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards", IEE Electronics Letters, vol. 41, 2005.
-
(2005)
IEE Electronics Letters
, vol.41
-
-
Ku, W.C.1
Chang, S.T.2
Chiang, M.H.3
-
15
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
M.K. Khan, and J. Zhang, "Improving the security of 'a flexible biometrics remote user authentication scheme'", Computer Standards & Interfaces, vol. 29, pp. 82-5, 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
-
17
-
-
0031122443
-
On-Line fingerprint verification
-
A.K. Jain, L. Hong, and R. Bolle, "On-Line fingerprint verification", IEEE Transactions Pattern Analysis and Machine Intelligence, vol. 19, pp. 302-14, 1997.
-
(1997)
IEEE Transactions Pattern Analysis and Machine Intelligence
, vol.19
, pp. 302-314
-
-
Jain, A.K.1
Hong, L.2
Bolle, R.3
-
18
-
-
48149110492
-
Local binary patterns for a hybrid fingerprint matcher
-
L. Nanni, and A. Lumini, "Local binary patterns for a hybrid fingerprint matcher", Pattern Recognition, vol. 41, pp. 3461-6, 2008.
-
(2008)
Pattern Recognition
, vol.41
, pp. 3461-3466
-
-
Nanni, L.1
Lumini, A.2
-
19
-
-
77951831414
-
FM model based fingerprint reconstruction from minutiae template
-
June, To Appear
-
J. Feng, and A. K. Jain, "FM model based fingerprint reconstruction from minutiae template", International conference on Biometrics (ICB), June 2009 (To Appear).
-
(2009)
International conference on Biometrics (ICB)
-
-
Feng, J.1
Jain, A.K.2
-
20
-
-
0036030112
-
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, Impacts of artificial gummy fingers on fingerprint system, Optical society and counterfeit deterrence techniques I V, proceedings of SPIE, 4677, 2002, pp. 275-89.
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impacts of artificial "gummy" fingers on fingerprint system", Optical society and counterfeit deterrence techniques I V, proceedings of SPIE, vol. 4677, 2002, pp. 275-89.
-
-
-
-
21
-
-
67549111388
-
Spoof proof fingerprinting
-
R.K. Rowe, "Spoof proof fingerprinting", Sensors Magazine, vol. 22, pp. 1-4, 2005.
-
(2005)
Sensors Magazine
, vol.22
, pp. 1-4
-
-
Rowe, R.K.1
-
22
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
Y.P. Liao, and S.S. Wang, "A secure dynamic ID based remote user authentication scheme for multi-server environment", Computer Standards & Interfaces, vol. 31, pp. 24-9, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.S.2
|