-
1
-
-
43949116287
-
Biometric Template Security
-
Article ID 579416
-
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing 2008, Article ID 579416, 17 (2008), doi:10.1155/2008/579416
-
EURASIP Journal on Advances in Signal Processing 2008
, vol.17
, pp. 2008
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
2
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948-960 (2004)
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
3
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Oakland, Calif, USA (May)
-
Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, Calif, USA, pp. 148-157 (May 1998)
-
(1998)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
5
-
-
33747624401
-
Combining crypto with biometrics effectively
-
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081-1088 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
6
-
-
26444507172
-
Practical biometric authentication with template protection
-
Kanade, T., Jain, A., Ratha, N.K. (eds). Springer, Heidelberg
-
Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.3546, pp. 436-446. Springer, Heidelberg (2005)
-
(2005)
AVBPA 2005. LNCS
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
7
-
-
0036350106
-
A fuzzy vault scheme
-
Piscataway, NJ, USA (June-July)
-
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the IEEE International Symposium on Information Theory, Piscataway, NJ, USA, p. 408 (June-July 2002)
-
(2002)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
8
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Berkley, Mich, USA (November)
-
Clancy, T., Lin, D., Kiyavash, N.: Secure smartcard-based fingerprint authentication. In: Proceedings of the ACMSIGMM Workshop on Biometric Methods and Applications, Berkley, Mich, USA, pp. 45-52 (November 2003)
-
(2003)
Proceedings of the ACMSIGMM Workshop on Biometric Methods and Applications
, pp. 45-52
-
-
Clancy, T.1
Lin, D.2
Kiyavash, N.3
-
9
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Kanade, T., Jain, A., Ratha, N.K. (eds). Springer, Heidelberg
-
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.3546, pp. 310-319. Springer, Heidelberg (2005)
-
(2005)
AVBPA 2005. LNCS
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
10
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C., Camenisch, J.L. (eds). Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
11
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Honolulu, Hawaii, USA (April)
-
Draper, S.C., Khisti, A., Martinian, E., Vetro, A., Yedidia, J.S.: Using distributed source coding to secure fingerprint biometrics. In: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2007), Honolulu, Hawaii, USA, vol.2, pp. 129-132 (April 2007)
-
(2007)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2007)
, vol.2
, pp. 129-132
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
12
-
-
27644463544
-
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures
-
Itakura, Y., Tsujii, S.: Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. International Journal of Information Security, 288-296 (2005)
-
(2005)
International Journal of Information Security
, pp. 288-296
-
-
Itakura, Y.1
Tsujii, S.2
-
13
-
-
69949139037
-
Security Considerations for the Implementation of Biometric Systems
-
Ratha, N., Bolle, R. (eds). Springer, Heidelberg
-
Soutar, C.: Security Considerations for the Implementation of Biometric Systems. In: Ratha, N., Bolle, R. (eds.) Automatic Fingerprint Recognition Systems, pp. 415-1131 Springer, Heidelberg (2004)
-
(2004)
Automatic Fingerprint Recognition Systems
, pp. 415-1131
-
-
Soutar, C.1
|