메뉴 건너뛰기




Volumn 5107 LNCS, Issue , 2008, Pages 21-36

Secure biometric authentication with improved accuracy

Author keywords

Classifier; Cryptography; Secure Biometric Authentication

Indexed keywords

BIOMETRICS; CLASSIFIERS; CRYPTOGRAPHY; PUBLIC KEY CRYPTOGRAPHY;

EID: 70349858081     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70500-0_3     Document Type: Conference Paper
Times cited : (38)

References (21)
  • 1
    • 38149070898 scopus 로고    scopus 로고
    • An application of the goldwasser-micali cryptosystem to biometric authentication
    • Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. Springer, Heidelberg
    • Bringer, J., Chabanne, H., Izabach̀ene, M., Pointcheval, D., Tang, Q., Zimmer, S.: An application of the goldwasser-micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.4586, pp. 96-106. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4586 , pp. 96-106
    • Bringer, J.1    Chabanne, H.2    Izabach̀ene, M.3    Pointcheval, D.4    Tang, Q.5    Zimmer, S.6
  • 3
    • 14844335721 scopus 로고    scopus 로고
    • Reusable cryptographic fuzzy extractors
    • Proceedings of the 11th ACM conference on Computer and communications security. ACM, New York
    • Boyen, X.: Reusable cryptographic fuzzy extractors. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 82-91. ACM, New York (2004)
    • (2004) CCS 2004 , pp. 82-91
    • Boyen, X.1
  • 4
    • 24944501364 scopus 로고    scopus 로고
    • Secure remote authentication using biometric data
    • Cramer R.J.F. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 147-163. Springer, Heidelberg (2005), http://www.cs. stanford.edu/xb/eurocrypt05b/
    • (2005) LNCS , vol.3494 , pp. 147-163
    • Boyen, X.1    Dodis, Y.2    Katz, J.3    Ostrovsky, R.4    Smith, A.5
  • 5
    • 0033281372 scopus 로고    scopus 로고
    • Password hardening based on keystroke dynamics
    • Proceedings of the 6th ACM conference on Computer and communications security.. ACM, New York
    • Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security, pp. 73-82. ACM, New York (1999)
    • (1999) CCS 1999 , pp. 73-82
    • Monrose, F.1    Reiter, M.K.2    Wetzel, S.3
  • 6
    • 33750950105 scopus 로고    scopus 로고
    • Fusion of methods for keystroke dynamic authentication
    • Fourth IEEE Workshop, October 17-18 2005
    • Hocquet, S., Ramel, J.Y., Cardot, H.: Fusion of methods for keystroke dynamic authentication. Automatic Identification Advanced Technologies, 2005. In: Fourth IEEE Workshop, October 17-18, 2005, pp. 224-229 (2005)
    • (2005) Automatic Identification Advanced Technologies , pp. 224-229
    • Hocquet, S.1    Ramel, J.Y.2    Cardot, H.3
  • 8
    • 22544440896 scopus 로고    scopus 로고
    • Combining evidence from source, suprasegmental and spectral features for a fixed-text speaker verification system
    • Yegnanarayana, B., Prasanna, S., Zachariah, J., Gupta, C.: Combining evidence from source, suprasegmental and spectral features for a fixed-text speaker verification system. IEEE Transactions on Speech and Audio Processing 13, 575-582 (2005)
    • (2005) IEEE Transactions on Speech and Audio Processing , vol.13 , pp. 575-582
    • Yegnanarayana, B.1    Prasanna, S.2    Zachariah, J.3    Gupta, C.4
  • 9
    • 33845460642 scopus 로고    scopus 로고
    • From features extraction to strong security in mobile environment: A new hybrid system
    • Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. Springer, Heidelberg
    • Cauchie, S., Brouard, T., Cardot, H.: From features extraction to strong security in mobile environment: A new hybrid system. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.4277, pp. 489-498. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4277 , pp. 489-498
    • Cauchie, S.1    Brouard, T.2    Cardot, H.3
  • 10
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • Feng, H., Choong, W.C.: Private key generation from on-line handwritten signatures. Inf. Manag. Comput. Security 10(4), 159-164 (2002)
    • (2002) Inf. Manag. Comput. Security , vol.10 , Issue.4 , pp. 159-164
    • Feng, H.1    Choong, W.C.2
  • 11
    • 70349877354 scopus 로고    scopus 로고
    • On-line signature verification: Fusion of a hidden markov model and a neural network via a support vector machine
    • Fuentes, M., Garcia-Salicetti, S., Dorizzi, B.: On-line signature verification: Fusion of a hidden markov model and a neural network via a support vector machine. iwfhr 00, 253 (2002)
    • (2002) Iwfhr , vol.0 , pp. 253
    • Fuentes, M.1    Garcia-Salicetti, S.2    Dorizzi, B.3
  • 12
    • 35248868841 scopus 로고    scopus 로고
    • Computation of cryptographic keys from face biometrics
    • Lioy, A., Mazzocchi, D. (eds.) CMS 2003. Springer, Heidelberg
    • Goh, A., Ling, D.N.C.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol.2828, pp. 1-13. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2828 , pp. 1-13
    • Goh, A.1    Ling, D.N.C.2
  • 13
    • 34147113451 scopus 로고    scopus 로고
    • Object recognition using fractal neighbor distance: Eventual convergence and recognition rates
    • Yan, T.T.H.: Object recognition using fractal neighbor distance: eventual convergence and recognition rates. In: Proceedings of 15th International Conference on Pattern Recognition, vol.2, pp. 781-784 (2000)
    • (2000) Proceedings of 15th International Conference on Pattern Recognition , vol.2 , pp. 781-784
    • Yan, T.T.H.1
  • 17
    • 0010442827 scopus 로고    scopus 로고
    • On the algorithmic implementation of multiclass kernelbased vector machines
    • Crammer, K., Singer, Y.: On the algorithmic implementation of multiclass kernelbased vector machines. Journal of Machine Learning Research 2, 265-292 (2001)
    • (2001) Journal of Machine Learning Research , vol.2 , pp. 265-292
    • Crammer, K.1    Singer, Y.2
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 20
    • 31144478622 scopus 로고    scopus 로고
    • Eficient public-key cryptosystems provably secure against active adversaries
    • Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. Springer, Heidelberg
    • Paillier, P., Pointcheval, D.: eficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.1716, pp. 165-179. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1716 , pp. 165-179
    • Paillier, P.1    Pointcheval, D.2
  • 21
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • Preneel B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 259-274. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.