-
1
-
-
38149070898
-
An application of the goldwasser-micali cryptosystem to biometric authentication
-
Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. Springer, Heidelberg
-
Bringer, J., Chabanne, H., Izabach̀ene, M., Pointcheval, D., Tang, Q., Zimmer, S.: An application of the goldwasser-micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.4586, pp. 96-106. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4586
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabach̀ene, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
2
-
-
38049093878
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235 (2003), http://eprint.iacr.org/
-
(2003)
Cryptology EPrint Archive, Report 2003/235
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
3
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Proceedings of the 11th ACM conference on Computer and communications security. ACM, New York
-
Boyen, X.: Reusable cryptographic fuzzy extractors. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 82-91. ACM, New York (2004)
-
(2004)
CCS 2004
, pp. 82-91
-
-
Boyen, X.1
-
4
-
-
24944501364
-
Secure remote authentication using biometric data
-
Cramer R.J.F. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 147-163. Springer, Heidelberg (2005), http://www.cs. stanford.edu/xb/eurocrypt05b/
-
(2005)
LNCS
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
5
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
Proceedings of the 6th ACM conference on Computer and communications security.. ACM, New York
-
Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security, pp. 73-82. ACM, New York (1999)
-
(1999)
CCS 1999
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
6
-
-
33750950105
-
Fusion of methods for keystroke dynamic authentication
-
Fourth IEEE Workshop, October 17-18 2005
-
Hocquet, S., Ramel, J.Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. Automatic Identification Advanced Technologies, 2005. In: Fourth IEEE Workshop, October 17-18, 2005, pp. 224-229 (2005)
-
(2005)
Automatic Identification Advanced Technologies
, pp. 224-229
-
-
Hocquet, S.1
Ramel, J.Y.2
Cardot, H.3
-
7
-
-
0034829626
-
Cryptographic key generation from voice
-
Monrose, F., Reiter, M., Li, Q., Wetzel, S.: Cryptographic key generation from voice. In: Proceedings of IEEE Symposium on Security and Privacy, S&P 2001, pp. 202-213 (2001)
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy, S&P 2001
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.2
Li, Q.3
Wetzel, S.4
-
8
-
-
22544440896
-
Combining evidence from source, suprasegmental and spectral features for a fixed-text speaker verification system
-
Yegnanarayana, B., Prasanna, S., Zachariah, J., Gupta, C.: Combining evidence from source, suprasegmental and spectral features for a fixed-text speaker verification system. IEEE Transactions on Speech and Audio Processing 13, 575-582 (2005)
-
(2005)
IEEE Transactions on Speech and Audio Processing
, vol.13
, pp. 575-582
-
-
Yegnanarayana, B.1
Prasanna, S.2
Zachariah, J.3
Gupta, C.4
-
9
-
-
33845460642
-
From features extraction to strong security in mobile environment: A new hybrid system
-
Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. Springer, Heidelberg
-
Cauchie, S., Brouard, T., Cardot, H.: From features extraction to strong security in mobile environment: A new hybrid system. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.4277, pp. 489-498. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4277
, pp. 489-498
-
-
Cauchie, S.1
Brouard, T.2
Cardot, H.3
-
10
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
Feng, H., Choong, W.C.: Private key generation from on-line handwritten signatures. Inf. Manag. Comput. Security 10(4), 159-164 (2002)
-
(2002)
Inf. Manag. Comput. Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Feng, H.1
Choong, W.C.2
-
11
-
-
70349877354
-
On-line signature verification: Fusion of a hidden markov model and a neural network via a support vector machine
-
Fuentes, M., Garcia-Salicetti, S., Dorizzi, B.: On-line signature verification: Fusion of a hidden markov model and a neural network via a support vector machine. iwfhr 00, 253 (2002)
-
(2002)
Iwfhr
, vol.0
, pp. 253
-
-
Fuentes, M.1
Garcia-Salicetti, S.2
Dorizzi, B.3
-
12
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
Lioy, A., Mazzocchi, D. (eds.) CMS 2003. Springer, Heidelberg
-
Goh, A., Ling, D.N.C.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol.2828, pp. 1-13. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2828
, pp. 1-13
-
-
Goh, A.1
Ling, D.N.C.2
-
13
-
-
34147113451
-
Object recognition using fractal neighbor distance: Eventual convergence and recognition rates
-
Yan, T.T.H.: Object recognition using fractal neighbor distance: eventual convergence and recognition rates. In: Proceedings of 15th International Conference on Pattern Recognition, vol.2, pp. 781-784 (2000)
-
(2000)
Proceedings of 15th International Conference on Pattern Recognition
, vol.2
, pp. 781-784
-
-
Yan, T.T.H.1
-
15
-
-
28444442293
-
A hidden markov model fingerprint matching approach
-
Guo, H.: A hidden markov model fingerprint matching approach. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, August 18-21, 2005, vol.8, pp. 5055-5059 (2005)
-
(2005)
Proceedings of 2005 International Conference on Machine Learning and Cybernetics, August 18-21, 2005
, vol.8
, pp. 5055-5059
-
-
Guo, H.1
-
16
-
-
33747624401
-
Combining crypto with biometrics effectively
-
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081-1088 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
17
-
-
0010442827
-
On the algorithmic implementation of multiclass kernelbased vector machines
-
Crammer, K., Singer, Y.: On the algorithmic implementation of multiclass kernelbased vector machines. Journal of Machine Learning Research 2, 265-292 (2001)
-
(2001)
Journal of Machine Learning Research
, vol.2
, pp. 265-292
-
-
Crammer, K.1
Singer, Y.2
-
18
-
-
70349851435
-
Secure biometric authentication with improved accuracy
-
Barbosa, M., Brouard, T., Cauchie, S., Sousa, S.: Secure biometric authentication with improved accuracy. Cryptology ePrint Archive (2008)
-
(2008)
Cryptology EPrint Archive
-
-
Barbosa, M.1
Brouard, T.2
Cauchie, S.3
Sousa, S.4
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
31144478622
-
Eficient public-key cryptosystems provably secure against active adversaries
-
Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. Springer, Heidelberg
-
Paillier, P., Pointcheval, D.: eficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.1716, pp. 165-179. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1716
, pp. 165-179
-
-
Paillier, P.1
Pointcheval, D.2
-
21
-
-
84948957152
-
Public-key encryption in a multi-user setting: Security proofs and improvements
-
Preneel B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 259-274. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
|