-
1
-
-
0033281339
-
A fuzzy commitment scheme
-
NewYork,NY, USA: ACM Press
-
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in CCS '99: Proceedings of the 6th ACM conference on Computer and Communications Security. NewYork,NY, USA: ACM Press, 1999, pp. 28-36.
-
(1999)
CCS '99: Proceedings of the 6th ACM Conference on Computer and Communications Security
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
2
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth and E. Teletar, Eds. IEEE Press
-
A. Juels and M. Sudan, "A fuzzy vault scheme," in Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, A. Lapidoth and E. Teletar, Eds. IEEE Press, 2002, p. 408.
-
(2002)
Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
3
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
ser. Lecture Notes in Computer Science, J. Kittler and M. S. Nixon, Eds., Springer
-
J.-P. M. G. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in AVBPA, ser. Lecture Notes in Computer Science, J. Kittler and M. S. Nixon, Eds., vol.2688. Springer, 2003, pp. 393-402.
-
(2003)
AVBPA
, vol.2688
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
4
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds., Springer, full version available at
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology - EUROCRYPT 2004, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds., vol.3027. Springer, 2004, pp. 523-540, full version available at http://eprint.iacr.org/2003/235.pdf.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
5
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
May
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identification," Proceedings of the IEEE Symposium on Security and Privacy - S&P '98, pp. 148-157, May 1998.
-
(1998)
Proceedings of the IEEE Symposium on Security and Privacy - S&P '98
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
6
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
March-April
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security and Privacy, vol.1, no.2, pp. 33-42, March-April 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
7
-
-
36448944282
-
Dermatoglyphic asymmetry and hair whorl patterns in schizophrenic and bipolar patients
-
15 January
-
R. Yousefi-Nooraie and S. Mortaz-Hedjri, "Dermatoglyphic asymmetry and hair whorl patterns in schizophrenic and bipolar patients," Psychiatry Research, vol.157, no.1-3, pp. 247-250, 15 January 2008.
-
(2008)
Psychiatry Research
, vol.157
, Issue.1-3
, pp. 247-250
-
-
Yousefi-Nooraie, R.1
Mortaz-Hedjri, S.2
-
8
-
-
0033555508
-
Primary care of infants and young children with Down syndrome
-
15 January
-
R. B. Saenz, "Primary care of infants and young children with Down syndrome," American Family Physician, vol.59, no.2, pp. 381-390, 15 January 1999.
-
(1999)
American Family Physician
, vol.59
, Issue.2
, pp. 381-390
-
-
Saenz, R.B.1
-
9
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Computers, vol.55, no.9, pp. 1081-1088, 2006.
-
(2006)
IEEE Trans. Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
10
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, no.4, pp. 561-572, 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
12
-
-
34848837353
-
Correcting errors without leaking partial information
-
New York, NY, USA: ACM
-
Y. Dodis and A. Smith, "Correcting errors without leaking partial information," in STOC '05: Proceedings of the thirtyseventh annual ACM symposium on Theory of computing. New York, NY, USA: ACM, 2005, pp. 654-663.
-
(2005)
STOC '05: Proceedings of the Thirty Seventh Annual ACM Symposium on Theory of Computing
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
13
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
NewYork,NY, USA: ACM, full version available at
-
X. Boyen, "Reusable cryptographic fuzzy extractors," in CCS '04: Proceedings of the 11th ACM conference on Computer and Communications Security. NewYork,NY, USA: ACM, 2004, pp. 82-91, full version available at http://www.cs.stanford.edu/xb/ccs04/.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Boyen, X.1
-
14
-
-
84946837370
-
Key-privacy in public-key encryption
-
ser. Lecture Notes in Computer Science, C. Boyd, Ed., Springer
-
M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval, "Key-privacy in public-key encryption," in ASIACRYPT, ser. Lecture Notes in Computer Science, C. Boyd, Ed., vol.2248. Springer, 2001, pp. 566-582.
-
(2001)
ASIACRYPT
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
15
-
-
26444507172
-
Practical biometric authentication with template protection
-
ser. Lecture Notes in Computer Science, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., Springer
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in AVBPA, ser. Lecture Notes in Computer Science, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., vol.3546. Springer, 2005, pp. 436-446.
-
(2005)
AVBPA
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
16
-
-
48649102434
-
Optimal iris fuzzy sketches
-
27-29 September
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, "Optimal iris fuzzy sketches," Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE International Conference on, pp. 1-6, 27-29 September 2007.
-
(2007)
Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE International Conference on
, pp. 1-6
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
18
-
-
0017468074
-
New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities
-
March
-
R. J. McEliece, E. R. Rodemich, H. Rumsey, and L. R. Welch, "New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities," IEEE Transactions on Information Theory, vol.23, no.2, pp. 157-166, March 1977.
-
(1977)
IEEE Transactions on Information Theory
, vol.23
, Issue.2
, pp. 157-166
-
-
McEliece, R.J.1
Rodemich, E.R.2
Rumsey, H.3
Welch, L.R.4
-
19
-
-
0001287361
-
A comparison of signaling alphabets
-
May
-
E. Gilbert, "A comparison of signaling alphabets," Bell System Technical Journal, vol.31, no.3, p. 504, May 1952.
-
(1952)
Bell System Technical Journal
, vol.31
, Issue.3
, pp. 504
-
-
Gilbert, E.1
-
20
-
-
0001920780
-
On the nonexistence of perfect codes over finite fields
-
A. Tietavainen, "On the nonexistence of perfect codes over finite fields," SIAM Journal on Applied Mathematics, vol. 24, no. 1, pp. 88-96, 1973.
-
(1973)
SIAM Journal on Applied Mathematics
, vol.24
, Issue.1
, pp. 88-96
-
-
Tietavainen, A.1
-
21
-
-
0002482317
-
List decoding: Algorithms and applications
-
March
-
M. Sudan, "List decoding: algorithms and applications," SIGACT News, vol. 31, no. 1, pp. 16-27, March 2000.
-
(2000)
SIGACT News
, vol.31
, Issue.1
, pp. 16-27
-
-
Sudan, M.1
-
22
-
-
35048882035
-
List decoding of error-correcting codes: Winning thesis of the 2002 ACM doctoral dissertation
-
Springer-Verlag Berlin, Heidelberg
-
V. Guruswami, List Decoding of Error-Correcting Codes: Winning Thesis of the 2002 ACM Doctoral Dissertation, ser. Lecture Notes in Computer Science. Springer-Verlag Berlin Heidelberg, 2005, vol. 3282.
-
(2005)
Ser. Lecture Notes in Computer Science
, vol.3282
-
-
Guruswami, V.1
|