-
1
-
-
0027629488
-
Common randomness in information theory and cryptography - Part I: Secret sharing
-
July
-
R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part I: Secret Sharing, " IEEE Trans. Inform. Theory, vol.IT-39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.IT-39
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
2
-
-
0031701886
-
Common randomness in information theory and cryptography - Part II: CR capacity
-
January
-
R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography - Part II: CR Capacity, " IEEE Trans. Inform. Theory, vol.IT-44, pp. 225 - 240, January 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.IT-44
, pp. 225-240
-
-
Ahlswede, R.1
Csiszar, I.2
-
3
-
-
0016037985
-
A simple converse for broadcast channels with additive white gaussian noise
-
March
-
P. Bergmans, "A Simple Converse for Broadcast Channels with Additive White Gaussian Noise, " IEEE Trans. Inform. Th., Vol.IT - 20, No.2, pp. 279 - 280, March 1974.
-
(1974)
IEEE Trans. Inform. Th.
, vol.IT-20
, Issue.2
, pp. 279-280
-
-
Bergmans, P.1
-
5
-
-
0016486048
-
A proof of the data compression theorem of slepain and wolf for ergodic sources
-
March
-
T.M. Cover, "A Proof of the Data Compression Theorem of Slepain and Wolf for Ergodic Sources, " IEEE Trans. Inform. Theory, vol.IT-22, pp. 226 - 228, March 1975.
-
(1975)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 226-228
-
-
Cover, T.M.1
-
6
-
-
0033891095
-
Common randomnness and secret key generation with a helper
-
March
-
I. Csiszar and P. Narayan, "Common Randomnness and Secret Key Generation with a Helper, " IEEE Trans. Inform. Theory, vol.IT-46, pp. 344 - 366, March 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.IT-46
, pp. 344-366
-
-
Csiszar, I.1
Narayan, P.2
-
7
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
24-28 Jun, Anchorage, Alaska, US, Workshop on Biometrics
-
C. Chen, R.N.J. Veldhuis, T.A.M. Kevenaar, and A.H.M. Akkermans, "Multi-Bits Biometric String Generation Based on the Likelihood Ratio, " IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, 24-28 Jun 2008, Anchorage, Alaska, US. pp. 1-7.
-
(2008)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, pp. 1-7
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
8
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen and G.W Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding, " IEEE Trans. Inform. Theory, Vol.47, pp. 1423 -1443, May 2001. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
10
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Nov.
-
J.G. Daugman, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence, " IEEE Trans, on Pattern Anal. Mach. Intell., vol.15, No.11, pp. 1148 - 1161, Nov. 1993.
-
(1993)
IEEE Trans, on Pattern Anal. Mach. Intell.
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.G.1
-
11
-
-
34547531639
-
On the security of the XOR-method in biometric authentication systems
-
Noordwijk, The Netherlands, June 8-9
-
T. Ignatenko and F. Willems, "On the Security of the XOR-Method in Biometric Authentication Systems, " Proc. 27th Symp. Inform. Theory in the Benelux, Noordwijk, The Netherlands, June 8-9, 2006, pp. 197 -204.
-
(2006)
Proc. 27th Symp. Inform. Theory in the Benelux
, pp. 197-204
-
-
Ignatenko, T.1
Willems, F.2
-
12
-
-
64549142823
-
Privacy leakage in biometric secrecy systems
-
September 23-26, 2008, Monticello, IL, USA
-
T. Ignatenko and F.M.J. Willems, "Privacy Leakage in Biometric Secrecy Systems, Proc. 2008 46th Annual Allerton Conference on Communication, Control and Computing, September 23-26, 2008, Monticello, IL, USA.
-
Proc. 2008 46th Annual Allerton Conference on Communication, Control and Computing
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
13
-
-
43949116287
-
Biometric template security
-
Article ID 579416
-
A.K. Jain, K. Nandakamur, and A. Nagar, "Biometric Template Security, " EURASIP Journal on Advances of Signal Processing, Vol.2008, Article ID 579416, 17 pages.
-
EURASIP Journal on Advances of Signal Processing
, vol.2008
, pp. 17
-
-
Jain, A.K.1
Nandakamur, K.2
Nagar, A.3
-
15
-
-
67549112684
-
Binary biomterics: An analytic framework to estimate the bit error probability under Gaussian assumption
-
29 Sep - 1 Oct, Washington, USA. IEEE Computer Society Press
-
E.J.C. Kelkboom, G. Garcia Molina, T.A.M. Kevenaar, R.N.J. Veldhuis, and W. Jonker, "Binary Biomterics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption, " 2nd IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2008, 29 Sep - 1 Oct 2008, Washington, USA. pp. 1-6. IEEE Computer Society Press.
-
(2008)
2nd IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2008
, pp. 1-6
-
-
Kelkboom, E.J.C.1
Molina, G.G.2
Kevenaar, T.A.M.3
Veldhuis, R.N.J.4
Jonker, W.5
-
16
-
-
64549127364
-
Privacy-security tradeoffs in biometric security systems
-
September 23 - 26, Monticello, IL, USA
-
L. Lai, S.-W Ho, and H.V. Poor, "Privacy-Security Tradeoffs in Biometric Security Systems, " Proc. 2008 46th Annual Allerton Conference on Communication, Control and Computing, September 23 - 26, 2008, Monticello, IL, USA.
-
(2008)
Proc. 2008 46th Annual Allerton Conference on Communication, Control and Computing
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
17
-
-
77649250983
-
Secure sketch for biometric templates
-
volume 4284 of LNCS, Shanghai, China, December
-
Q. Li, Y. Sutcu, and N. Memon, "Secure Sketch for Biometric Templates, " Asiacrypt, volume 4284 of LNCS, Shanghai, China, December 2006.
-
(2006)
Asiacrypt
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
19
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. Maurer, "Secret Key Agreement by Public Discussion from Common Information, " IEEE Trans. Inform. Theory, IT-39, pp. 733-742, 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.IT-39
, pp. 733-742
-
-
Maurer, U.1
-
21
-
-
26444507172
-
Practical biometric authentication with template protection
-
Rye Brook, New York. Springer-Verlag Berlin
-
P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.-J. Schrijen, A, Bazen, and R.N.J. Veldhuis, "Practical Biometric Authentication with Template Protection, " 5th Int. Conf. on Audio- and Video-Based Personal Authentication (AVBPA), Rye Brook, New York. pp. 436-446. Springer-Verlag Berlin, 2005.
-
(2005)
5th Int. Conf. on Audio- and Video-Based Personal Authentication (AVBPA)
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.5
Veldhuis, R.N.J.6
-
22
-
-
84856043672
-
A mathematical theory of communication
-
623 - 656 (Part II), July/Oct.
-
C.E. Shannon, "A Mathematical Theory of Communication, " Bell Syst. Tech. J., vol.27, pp. 379 - 423 (Part I), 623 - 656 (Part II), July/Oct. 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, Issue.PART I
, pp. 379-423
-
-
Shannon, C.E.1
-
24
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Set.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting Biometric Templates With Sketch: Theory and Practice, " IEEE Trans. on Inform. Forens. and Security, Vol.2, No.3. Set. 2007, pp. 503 - 512.
-
(2007)
IEEE Trans. on Inform. Forens. and Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
25
-
-
52349098088
-
Feature extraction for a slepian-wolf biometric system using LDPC codes
-
Toronto, July 6-11
-
Y. Sutcu, S. Rane, J.S. Yedidia, S.C. Draper, and A. Vetro, "Feature Extraction for a Slepian-Wolf Biometric System Using LDPC Codes, " Proc. IEEE Int. Symp. Inform. Theory, Toronto, July 6-11, 2008, pp. 2297 - 2301.
-
(2008)
Proc. IEEE Int. Symp. Inform. Theory
, pp. 2297-2301
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.S.3
Draper, S.C.4
Vetro, A.5
-
26
-
-
1442337635
-
Reconcilliation of a quantum-distributed Gaussian key
-
Feb.
-
G. Van Assche, J. Cardinal, a nd N.J. Cerf, "Reconcilliation of a Quantum-Distributed Gaussian Key, " IEEE Trans. Inform. Th., Vol.IT - 50, No.2, pp. 394 - 400, Feb. 2004.
-
(2004)
IEEE Trans. Inform. Th.
, vol.IT-50
, Issue.2
, pp. 394-400
-
-
Van Assche, G.1
Cardinal, J.2
Cerf, N.J.3
-
27
-
-
0031647696
-
The common randomness capacity of a pair of independent discrete memoryless channels
-
January
-
S. Venkatesan and V. Anantharam, "The Common Randomness Capacity of a Pair of Independent Discrete Memoryless Channels, " IEEE Trans. Inform. Theory, vol.IT-44, pp. 215 - 224, January 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.IT-44
, pp. 215-224
-
-
Venkatesan, S.1
Anantharam, V.2
-
28
-
-
33646020998
-
A simple proof of the entropy power inequality
-
May
-
S. Verdu and D. Guo, "A Simple Proof of the Entropy Power Inequality, " IEEE Trans. Inform. Th., Vol.IT - 52, No.5, pp. 2165 - 2166, May 2006.
-
(2006)
IEEE Trans. Inform. Th.
, vol.IT-52
, Issue.5
, pp. 2165-2166
-
-
Verdu, S.1
Guo, D.2
-
29
-
-
70349281384
-
Coding theorem for the AWGN channel in terms of jointly typical sequences
-
Houthalen, Belgium, May 25 & 26
-
F.M.J. Willems, "Coding Theorem for the AWGN Channel in Terms of Jointly Typical Sequences, " Proc. 10th Symp. on Inform. Th. in the Benelux, Houthalen, Belgium, May 25 & 26, 1989, pp. 13 - 18.
-
(1989)
Proc. 10th Symp. on Inform. Th. in the Benelux
, pp. 13-18
-
-
Willems, F.M.J.1
-
30
-
-
39049156464
-
Extracting secrecy from gaussian random variables
-
Seattle, USA, July 9 - 14
-
C. Ye, A. Reznik, and Y. Shah, "Extracting Secrecy from Gaussian Random Variables, " IEEE Int. Symp. Inform. Theory, Seattle, USA, July 9 - 14, 2006, pp. 2593 - 2597.
-
(2006)
IEEE Int. Symp. Inform. Theory
, pp. 2593-2597
-
-
Ye, C.1
Reznik, A.2
Shah, Y.3
-
31
-
-
33749443558
-
Secret and private key constructions for simple multiterminal source models
-
Adelaide, Australia, Sept. 4 - 9
-
Chunxuan Ye and P. Narayan, "Secret and Private Key Constructions for Simple Multiterminal Source Models, " Proc. IEEE Int. Symp. Inform. Theory, Adelaide, Australia, Sept. 4 - 9, 2005, pp. 2138 - 2141.
-
(2005)
Proc. IEEE Int. Symp. Inform. Theory
, pp. 2138-2141
-
-
Ye, C.1
Narayan, P.2
|