-
1
-
-
34547307379
-
Fingerprint identification and verification system using minutiae matching
-
F. A. Afsar, M. Arif, and M. Hussain, "Fingerprint identification and verification system using minutiae matching," in Proc. National Conf. Emerging Technologies, 2004, pp. 141-146.
-
(2004)
Proc. National Conf. Emerging Technologies
, pp. 141-146
-
-
Afsar, F.A.1
Arif, M.2
Hussain, M.3
-
2
-
-
0005078946
-
Entity authentication and key distribution
-
Lecture Notes in Computer Science
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. Advances in Cryptology (CRYPTO'93), 1993, vol.773, pp. 22-26, Lecture Notes in Computer Science.
-
(1993)
Proc. Advances in Cryptology (CRYPTO'93)
, vol.773
, pp. 22-26
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
34547519982
-
Privacy preserving multi-factor authentication with biometrics
-
A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, S. Modi, M. Young, and S. J. Elliott, "Privacy preserving multi-factor authentication with biometrics," J. Comput. Security, vol.15, no.5, pp. 529-560, 2007.
-
(2007)
J. Comput. Security
, vol.15
, Issue.5
, pp. 529-560
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Bertino, E.3
Modi, S.4
Young, M.5
Elliott, S.J.6
-
4
-
-
0024880585
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., vol.23, no.5, pp. 1-13, 1989.
-
(1989)
ACM Trans. Comput. Syst
, vol.23
, Issue.5
, pp. 1-13
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
33645767442
-
Remarks on fingerprint-based remote user authentication scheme using smart cards
-
C. C. Chang and I. C. Lin, "Remarks on fingerprint-based remote user authentication scheme using smart cards," ACM SIGOPS Operating Syst. Rev., vol.38, no.4, pp. 91-96, 2004.
-
(2004)
ACM SIGOPS Operating Syst. Rev
, vol.38
, Issue.4
, pp. 91-96
-
-
Chang, C.C.1
Lin, I.C.2
-
6
-
-
8844234621
-
On the relation of error correction and cryptography to an offine biometric based identication scheme
-
G. I. Davida, B. J. Matt, R. Peralta, and Y. Frankel, "On the relation of error correction and cryptography to an offine biometric based identication scheme," in Proc. Workshop Coding Cryptography, 1999, pp. 129-138.
-
(1999)
Proc. Workshop Coding Cryptography
, pp. 129-138
-
-
Davida, G.I.1
Matt, B.J.2
Peralta, R.3
Frankel, Y.4
-
7
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Eurocrypt 2004, pp. 523-540.
-
(2004)
Eurocrypt
, pp. 523-540
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
L. Gong, R. Needham, and R. Yahalom, "Reasoning about belief in cryptographic protocols," in Proc. 1990 IEEE Computer Society Symp. Research in Security and Privacy, 1990, pp. 234-246.
-
(1990)
Proc. 1990 IEEE Computer Society Symp. Research in Security and Privacy
, pp. 234-246
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
9
-
-
33747624401
-
Combining crypto with biometrics effectively
-
Jan.
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Comput., vol.55, no.1, pp. 1081-1088, Jan. 2006.
-
(2006)
IEEE Trans. Comput
, vol.55
, Issue.1
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
10
-
-
0033281339
-
A fuzzy commitment scheme
-
Computer and Communications Security
-
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. ACMConf. Computer and Communications Security, 1999, pp. 28-36.
-
(1999)
Proc. ACMConf
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
12
-
-
23344449693
-
ID-based password authentication scheme using smart cards and fingerprints
-
H. S. Kim, J. K. Lee, and K. Y.Yoo, "ID-based password authentication scheme using smart cards and fingerprints," ACM SIGOPS Operating Syst. Rev., vol.37, no.4, pp. 32-41, 2003.
-
(2003)
ACM SIGOPS Operating Syst. Rev
, vol.37
, Issue.4
, pp. 32-41
-
-
Kim, H.S.1
Lee, J.K.2
Yoo, K.Y.3
-
13
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
J. K. Lee, S. R. Ryu, and K. Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards," Electron. Lett., vol.38, no.12, pp. 554-555, 2002.
-
(2002)
Electron. Lett
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
14
-
-
33745890209
-
An improved fingerprint-based remote user authentication scheme using smart cards
-
Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II
-
Y. Lee and T. Kwon, "An improved fingerprint-based remote user authentication scheme using smart cards," in Proc. ICCSA 2006, 2006, vol.3981, pp. 915-922, Lecture Notes in Computer Science. (Pubitemid 44045394)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3981
, pp. 915-922
-
-
Lee, Y.1
Kwon, T.2
-
15
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
C. H. Lin and Y. Y. Lai, "A flexible biometrics remote user authentication scheme," Comput. Standards Interfaces, vol.27, no.1, pp. 19-23, 2004.
-
(2004)
Comput. Standards Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.H.1
Lai, Y.Y.2
-
16
-
-
3042781449
-
Toward reliable user authentication through biometrics
-
May/Jun.
-
V. Matyas, Jr. and Z. Riha, "Toward reliable user authentication through biometrics," IEEE Security Privacy, vol.1, no.3, pp. 45-49, May/Jun. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.3
, pp. 45-49
-
-
Matyas Jr., V.1
Riha, Z.2
-
17
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Springer-Verlag
-
V. Miller, "Uses of elliptic curves in cryptography," Advances in Cryptology- Crypto85, ser. Lecture Notes in Compute Science, no.218, pp. 417-426, 1985, Springer-Verlag.
-
(1985)
Advances in Cryptology- Crypto85, Ser. Lecture Notes in Compute Science
, Issue.218
, pp. 417-426
-
-
Miller, V.1
-
19
-
-
0025405980
-
A critique of the Burrows, Abadi, and Needham logic
-
D. M. Nessett, "A critique of the Burrows, Abadi, and Needham logic," Operating Syst. Rev., vol.24, no.2, pp. 35-38, 1990.
-
(1990)
Operating Syst. Rev
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
20
-
-
0003614758
-
-
Computer Science, Cambridge, MA, Tech. Rep. MIT/LCS/TR212
-
M. O. Rabin, Digitalized Signatures and Public-key Functions as Intractable as Factorizations MIT Lab., Computer Science, Cambridge, MA, Tech. Rep. MIT/LCS/TR212, 1979.
-
(1979)
Digitalized Signatures and Public-key Functions As Intractable As Factorizations MIT Lab.
-
-
Rabin, M.O.1
-
22
-
-
85088053686
-
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
-
ser New York: Springer-Verlag
-
L. Rila and C. J. Mitchell, Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards, ser. Lecture Notes in Computer Science. New York: Springer-Verlag, 2005, vol.3482, pp. 488-497.
-
(2005)
Lecture Notes in Computer Science
, vol.3482
, pp. 488-497
-
-
Rila, L.1
Mitchell, C.J.2
-
23
-
-
33645758252
-
Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints
-
M. Scott, "Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints," ACM SIGOPS Operating Syst. Rev., vol.38, no.2, pp. 73-75, 2004.
-
(2004)
ACM SIGOPS Operating Syst. Rev
, vol.38
, Issue.2
, pp. 73-75
-
-
Scott, M.1
-
24
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sep.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol.2, no.3, pp. 503-512, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
25
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun.
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, Special Issue on Multimedia Security for Digital Rights Management, vol.92, no.6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE, Special Issue on Multimedia Security for Digital Rights Management
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
|