-
1
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Advances in Cryptology - Eurocrypt 2004, Cachin and Camenisch (Eds.), Springer-Verlag
-
Y. Dodis, L. Reyzin, A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, In: Advances in Cryptology - Eurocrypt 2004, Cachin and Camenisch (Eds.), Lecture Notes in Computer Science 3027, Springer-Verlag, 2004, 523-540.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
2
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Y. Sutcu, Q. Li, and N. Memon, Protecting Biometric Templates with Sketch: Theory and Practice, IEEE Transactions on Information Forensics and Security, vol.2, no.3, 2007, 503-512.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
3
-
-
84894038661
-
Using voice to generate cryptographic keys
-
Crete
-
F. Monrose, M.K. Reiter, Q. Li, S. Wetzel.: Using Voice to Generate Cryptographic Keys. A Speaker Odyssey, The Speech Recognition Workshop, Crete, 2001.
-
(2001)
A Speaker Odyssey, the Speech Recognition Workshop
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
4
-
-
33751585800
-
Biometric hash based on statistical features of online signature
-
Quebec City, Canada
-
C. Vielhauer, R. Steinmetz, A. Mayerhöfer: Biometric Hash based on Statistical Features of Online Signature, Proc. of the International Conference on Pattern Recognition (ICPR), Quebec City, Canada, Vol.1, 2002.
-
(2002)
Proc. of the International Conference on Pattern Recognition (ICPR)
, vol.1
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhöfer, A.3
-
7
-
-
59149086015
-
A cryptographic biometric authentication system based on genetic fingerprints
-
Alkassar Siekmann (Eds.). Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e. Saarbrücken
-
U. Korte, M. Krawczak, J. Merkle, R. Plaga, M. Niesing, C. Tiemann, H. Vinck, U. Martini: A cryptographic biometric authentication system based on genetic fingerprints, In: Alkassar, Siekmann (Eds.): Sicherheit 2008 - Sicherheit, Schutz und Zuverlässigkeit; Beiträge der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., Saarbrücken, 2008.
-
(2008)
Sicherheit 2008 - Sicherheit Schutz und Zuverlässigkeit; Beiträge der 4
-
-
Korte, U.1
Krawczak, M.2
Merkle, J.3
Plaga, R.4
Niesing, M.5
Tiemann, C.6
Vinck, H.7
Martini, U.8
-
8
-
-
59149105282
-
Advanced studies on reproducibility of biometric hashes
-
B. Schouten et al. (Eds.): Biometrics and Identity Management, Springer-Verlag Berlin, Heidelberg
-
T. Scheidat, C. Vielhauer, J. Dittmann, Advanced Studies on Reproducibility of Biometric Hashes, In: B. Schouten et al. (Eds.): Biometrics and Identity Management, Springer-Verlag Berlin, Heidelberg, LNCS 5372, 2008.
-
(2008)
LNCS
, vol.5372
-
-
Scheidat, T.1
Vielhauer, C.2
Dittmann, J.3
-
11
-
-
56749164763
-
Three factor scheme for biometricbased cryptographic key regeneration using iris
-
September 23-25, Tampa, Florida, USA
-
S.G. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacrétaz, B. Dorizzi: Three factor scheme for biometricbased cryptographic key regeneration using iris, In proceedings of BSYM '08: The 6th Biometrics Symposium in conjunction with The Biometric Consortium Conference (BCC), September 23-25, Tampa, Florida, USA, 2008, pp. 59-64.
-
(2008)
Proceedings of BSYM ' 08: The 6th Biometrics Symposium in Conjunction with the Biometric Consortium Conference (BCC)
, pp. 59-64
-
-
Kanade, S.G.1
Camara, D.2
Krichen, E.3
Petrovska-Delacrétaz, D.4
Dorizzi, B.5
|