메뉴 건너뛰기




Volumn , Issue , 2008, Pages 36-47

A multiple-control fuzzy vault

Author keywords

[No Author keywords available]

Indexed keywords

FUZZY VAULT; MULTILEVEL ACCESS; MULTIPLE USER; SECRET SHARING SCHEMES; SIMILARITIES AND DIFFERENCES;

EID: 67650091706     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2008.23     Document Type: Conference Paper
Times cited : (8)

References (15)
  • 1
    • 0036039020 scopus 로고    scopus 로고
    • Arora and Khot. Fitting algebraic curves to noisy data. In STOC: ACM Symposium on Theory of Computing (STOC), 2002.
    • Arora and Khot. Fitting algebraic curves to noisy data. In STOC: ACM Symposium on Theory of Computing (STOC), 2002.
  • 2
    • 67650027662 scopus 로고    scopus 로고
    • Bleichenbacher and Nguyen. Noisy polynomial interpolation and noisy chinese remaindering. In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 2000.
    • Bleichenbacher and Nguyen. Noisy polynomial interpolation and noisy chinese remaindering. In EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 2000.
  • 4
    • 0027711375 scopus 로고    scopus 로고
    • E. Dawson and D. Donovan. Shamir's Scheme Says It all. In E. G. Dougall, editor, SEC, A-37 of IFIP Transactions, pages 91-102. North-Holland, 1993.
    • E. Dawson and D. Donovan. Shamir's Scheme Says It all. In E. G. Dougall, editor, SEC, volume A-37 of IFIP Transactions, pages 91-102. North-Holland, 1993.
  • 5
    • 67650053331 scopus 로고    scopus 로고
    • Guruswami and Sudan. Improved decoding of reed-solomon and algebraic-geometric codes. In ECCCTR: Electronic Colloquium on Computational Complexity, technical reports, 1998.
    • Guruswami and Sudan. Improved decoding of reed-solomon and algebraic-geometric codes. In ECCCTR: Electronic Colloquium on Computational Complexity, technical reports, 1998.
  • 8
    • 40349095012 scopus 로고    scopus 로고
    • Analysis and Problems on Fuzzy Vault Scheme
    • IEEE Computer Society
    • Q. Li, Z. Liu, and X. Niu. Analysis and Problems on Fuzzy Vault Scheme. In IIH-MSP, pages 244-250. IEEE Computer Society, 2006.
    • (2006) IIH-MSP , pp. 244-250
    • Li, Q.1    Liu, Z.2    Niu, X.3
  • 9
    • 38349055140 scopus 로고    scopus 로고
    • Fingerprint Template Protection Using Fuzzy Vault
    • O. Gervasi and M. L. Gavrilova, editors, ICCSA 3, of, Springer
    • D.Moon, S. Lee, S. Jung, Y. Chung, M. Park, and O. Yi. Fingerprint Template Protection Using Fuzzy Vault. In O. Gervasi and M. L. Gavrilova, editors, ICCSA (3), volume 4707 of Lecture Notes in Computer Science, pages 1141-1151. Springer, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4707 , pp. 1141-1151
    • Moon, D.1    Lee, S.2    Jung, S.3    Chung, Y.4    Park, M.5    Yi, O.6
  • 10
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 11
    • 0003038453 scopus 로고
    • An Introduction to shared secret and/or shared control schemes and their applications
    • IEEE Press
    • G. Simmons. An Introduction to shared secret and/or shared control schemes and their applications. In In Contemporary Cryptology, The Science of Information Integrity, IEEE Press, pages 441-497, 1991.
    • (1991) In Contemporary Cryptology, The Science of Information Integrity , pp. 441-497
    • Simmons, G.1
  • 13
    • 33845532978 scopus 로고    scopus 로고
    • Securing Fingerprint Template: Fuzzy Vault with Helper Data
    • U. Uludag and A. K. Jain. Securing Fingerprint Template: Fuzzy Vault with Helper Data. In Privacy Research in Vision, page 163, 2006.
    • (2006) Privacy Research in Vision , pp. 163
    • Uludag, U.1    Jain, A.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.