메뉴 건너뛰기




Volumn , Issue , 2009, Pages 188-203

Privacy weaknesses in biometric sketches

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC DATA; BIOMETRIC ENCRYPTION; BIOMETRIC TEMPLATE; ERROR CORRECTING CODE; PRIVACY CONCERNS; TEMPLATE PROTECTION;

EID: 70449640064     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.24     Document Type: Conference Paper
Times cited : (133)

References (22)
  • 3
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • ser. Lecture Notes in Computer Science, J. Kittler and M. S. Nixon, Eds., Springer
    • J.-P. M. G. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in AVBPA, ser. Lecture Notes in Computer Science, J. Kittler and M. S. Nixon, Eds., vol.2688. Springer, 2003, pp. 393-402.
    • (2003) AVBPA , vol.2688 , pp. 393-402
    • Linnartz, J.-P.M.G.1    Tuyls, P.2
  • 4
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds., Springer, full version available at
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology - EUROCRYPT 2004, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds., vol.3027. Springer, 2004, pp. 523-540, full version available at http://eprint.iacr.org/2003/235.pdf.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 6
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • March-April
    • S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security and Privacy, vol.1, no.2, pp. 33-42, March-April 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.2 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.K.3
  • 7
    • 36448944282 scopus 로고    scopus 로고
    • Dermatoglyphic asymmetry and hair whorl patterns in schizophrenic and bipolar patients
    • 15 January
    • R. Yousefi-Nooraie and S. Mortaz-Hedjri, "Dermatoglyphic asymmetry and hair whorl patterns in schizophrenic and bipolar patients," Psychiatry Research, vol.157, no.1-3, pp. 247-250, 15 January 2008.
    • (2008) Psychiatry Research , vol.157 , Issue.1-3 , pp. 247-250
    • Yousefi-Nooraie, R.1    Mortaz-Hedjri, S.2
  • 8
    • 0033555508 scopus 로고    scopus 로고
    • Primary care of infants and young children with Down syndrome
    • 15 January
    • R. B. Saenz, "Primary care of infants and young children with Down syndrome," American Family Physician, vol.59, no.2, pp. 381-390, 15 January 1999.
    • (1999) American Family Physician , vol.59 , Issue.2 , pp. 381-390
    • Saenz, R.B.1
  • 9
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Computers, vol.55, no.9, pp. 1081-1088, 2006.
    • (2006) IEEE Trans. Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 14
    • 84946837370 scopus 로고    scopus 로고
    • Key-privacy in public-key encryption
    • ser. Lecture Notes in Computer Science, C. Boyd, Ed., Springer
    • M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval, "Key-privacy in public-key encryption," in ASIACRYPT, ser. Lecture Notes in Computer Science, C. Boyd, Ed., vol.2248. Springer, 2001, pp. 566-582.
    • (2001) ASIACRYPT , vol.2248 , pp. 566-582
    • Bellare, M.1    Boldyreva, A.2    Desai, A.3    Pointcheval, D.4
  • 15
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • ser. Lecture Notes in Computer Science, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., Springer
    • P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in AVBPA, ser. Lecture Notes in Computer Science, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., vol.3546. Springer, 2005, pp. 436-446.
    • (2005) AVBPA , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Schrijen, G.J.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 18
    • 0017468074 scopus 로고
    • New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities
    • March
    • R. J. McEliece, E. R. Rodemich, H. Rumsey, and L. R. Welch, "New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities," IEEE Transactions on Information Theory, vol.23, no.2, pp. 157-166, March 1977.
    • (1977) IEEE Transactions on Information Theory , vol.23 , Issue.2 , pp. 157-166
    • McEliece, R.J.1    Rodemich, E.R.2    Rumsey, H.3    Welch, L.R.4
  • 19
    • 0001287361 scopus 로고
    • A comparison of signaling alphabets
    • May
    • E. Gilbert, "A comparison of signaling alphabets," Bell System Technical Journal, vol.31, no.3, p. 504, May 1952.
    • (1952) Bell System Technical Journal , vol.31 , Issue.3 , pp. 504
    • Gilbert, E.1
  • 20
    • 0001920780 scopus 로고
    • On the nonexistence of perfect codes over finite fields
    • A. Tietavainen, "On the nonexistence of perfect codes over finite fields," SIAM Journal on Applied Mathematics, vol. 24, no. 1, pp. 88-96, 1973.
    • (1973) SIAM Journal on Applied Mathematics , vol.24 , Issue.1 , pp. 88-96
    • Tietavainen, A.1
  • 21
    • 0002482317 scopus 로고    scopus 로고
    • List decoding: Algorithms and applications
    • March
    • M. Sudan, "List decoding: algorithms and applications," SIGACT News, vol. 31, no. 1, pp. 16-27, March 2000.
    • (2000) SIGACT News , vol.31 , Issue.1 , pp. 16-27
    • Sudan, M.1
  • 22
    • 35048882035 scopus 로고    scopus 로고
    • List decoding of error-correcting codes: Winning thesis of the 2002 ACM doctoral dissertation
    • Springer-Verlag Berlin, Heidelberg
    • V. Guruswami, List Decoding of Error-Correcting Codes: Winning Thesis of the 2002 ACM Doctoral Dissertation, ser. Lecture Notes in Computer Science. Springer-Verlag Berlin Heidelberg, 2005, vol. 3282.
    • (2005) Ser. Lecture Notes in Computer Science , vol.3282
    • Guruswami, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.