-
1
-
-
0036039020
-
-
Arora and Khot. Fitting algebraic curves to noisy data. In STOC: ACM Symposium on Theory of Computing (STOC), 2002.
-
Arora and Khot. Fitting algebraic curves to noisy data. In STOC: ACM Symposium on Theory of Computing (STOC), 2002.
-
-
-
-
2
-
-
67650027662
-
-
Bleichenbacher and Nguyen. Noisy polynomial interpolation and noisy chinese remaindering. In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 2000.
-
Bleichenbacher and Nguyen. Noisy polynomial interpolation and noisy chinese remaindering. In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 2000.
-
-
-
-
3
-
-
84937704662
-
Secure smartcardbased fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin. Secure smartcardbased fingerprint authentication. In In ACM SIGMM Work. Biom. Meth. Apps., Berkeley, page 4552, 2003.
-
(2003)
In ACM SIGMM Work. Biom. Meth. Apps., Berkeley
, pp. 4552
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
4
-
-
0027711375
-
-
E. Dawson and D. Donovan. Shamir's Scheme Says It all. In E. G. Dougall, editor, SEC, A-37 of IFIP Transactions, pages 91-102. North-Holland, 1993.
-
E. Dawson and D. Donovan. Shamir's Scheme Says It all. In E. G. Dougall, editor, SEC, volume A-37 of IFIP Transactions, pages 91-102. North-Holland, 1993.
-
-
-
-
5
-
-
67650053331
-
-
Guruswami and Sudan. Improved decoding of reed-solomon and algebraic-geometric codes. In ECCCTR: Electronic Colloquium on Computational Complexity, technical reports, 1998.
-
Guruswami and Sudan. Improved decoding of reed-solomon and algebraic-geometric codes. In ECCCTR: Electronic Colloquium on Computational Complexity, technical reports, 1998.
-
-
-
-
8
-
-
40349095012
-
Analysis and Problems on Fuzzy Vault Scheme
-
IEEE Computer Society
-
Q. Li, Z. Liu, and X. Niu. Analysis and Problems on Fuzzy Vault Scheme. In IIH-MSP, pages 244-250. IEEE Computer Society, 2006.
-
(2006)
IIH-MSP
, pp. 244-250
-
-
Li, Q.1
Liu, Z.2
Niu, X.3
-
9
-
-
38349055140
-
Fingerprint Template Protection Using Fuzzy Vault
-
O. Gervasi and M. L. Gavrilova, editors, ICCSA 3, of, Springer
-
D.Moon, S. Lee, S. Jung, Y. Chung, M. Park, and O. Yi. Fingerprint Template Protection Using Fuzzy Vault. In O. Gervasi and M. L. Gavrilova, editors, ICCSA (3), volume 4707 of Lecture Notes in Computer Science, pages 1141-1151. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4707
, pp. 1141-1151
-
-
Moon, D.1
Lee, S.2
Jung, S.3
Chung, Y.4
Park, M.5
Yi, O.6
-
10
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
11
-
-
0003038453
-
An Introduction to shared secret and/or shared control schemes and their applications
-
IEEE Press
-
G. Simmons. An Introduction to shared secret and/or shared control schemes and their applications. In In Contemporary Cryptology, The Science of Information Integrity, IEEE Press, pages 441-497, 1991.
-
(1991)
In Contemporary Cryptology, The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.1
-
13
-
-
33845532978
-
Securing Fingerprint Template: Fuzzy Vault with Helper Data
-
U. Uludag and A. K. Jain. Securing Fingerprint Template: Fuzzy Vault with Helper Data. In Privacy Research in Vision, page 163, 2006.
-
(2006)
Privacy Research in Vision
, pp. 163
-
-
Uludag, U.1
Jain, A.K.2
-
15
-
-
10044222391
-
Biometric Cryptosystems: Issues and Challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain. Biometric Cryptosystems: Issues and Challenges. Proceedings of the IEEE, 92(6):948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
|