-
1
-
-
56749164763
-
Three factor scheme for biometric-based cryptographic key regeneration using iris,
-
S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacrétaz, and B. Dorizzi, "Three factor scheme for biometric-based cryptographic key regeneration using iris, " in The 6th Biometrics Symposium, 2008.
-
(2008)
The 6th Biometrics Symposium
-
-
Kanade, S.1
Camara, D.2
Krichen, E.3
Petrovska-Delacrétaz, D.4
Dorizzi, B.5
-
2
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively, " IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
3
-
-
38149030200
-
-
Information and privacy commissioner of Ontario, White Paper, March 2007
-
A. Cavoukian and A. Stoianov, "Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy, " Information and privacy commissioner of Ontario, White Paper, March 2007.
-
Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy
-
-
Cavoukian, A.1
Stoianov, A.2
-
4
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis,
-
June
-
T. E. Boult, W. J. Scheirer, and R. Woodworth, "Revocable fingerprint biotokens: Accuracy and security analysis, " in IEEE Conference on Computer Vision and Pattern Recognition, June 2007, pp. 1-8.
-
(2007)
IEEE Conference on Computer Vision and Pattern Recognition
, pp. 1-8
-
-
Boult, T.E.1
Scheirer, W.J.2
Woodworth, R.3
-
5
-
-
33750533142
-
An improved biohashing for human authentication
-
March
-
A. Lumini and L. Nanni, "An improved biohashing for human authentication, " Pattern Recognition, vol. 40, no. 3, pp. 1057-1065, March 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
6
-
-
33947530278
-
Generating cancelable fingerprint templates
-
April
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates, " IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561-572, April 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
7
-
-
10044284550
-
Cancelable biometric filters for face recognition,
-
August
-
M. Savvides, B. V. Kumar, and P. Khosla, "Cancelable biometric filters for face recognition, " in Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), vol. 3, August 2004, pp. 922-925.
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition (ICPR04)
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.2
Khosla, P.3
-
8
-
-
48649102434
-
Optimal iris fuzzy sketches,
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zmor, "Optimal iris fuzzy sketches, " in IEEE Conference on Biometrics: Theory, Applications and Systems, 2007.
-
(2007)
IEEE Conference on Biometrics: Theory, Applications and Systems
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zmor, G.5
-
10
-
-
0036350106
-
A fuzzy vault scheme,
-
A. Lapidoth and E. Teletar, Eds. IEEE Press
-
A. Juels and M. Sudan, "A fuzzy vault scheme, " in Proc. IEEE Int. Symp. Information Theory, A. Lapidoth and E. Teletar, Eds. IEEE Press, 2002, p. 408.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
11
-
-
0033281372
-
Password hardening based on keystroke dynamics,
-
F. Monrose, M. Reiter, and R. Wetzel, "Password hardening based on keystroke dynamics, " in Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS), 1999, pp. 73-82.
-
(1999)
Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS)
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.2
Wetzel, R.3
-
12
-
-
0034829626
-
Cryptographic key generation from voice,
-
May
-
F. Monrose, M. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice, " in Proceedings of the IEEE Symposium on Security and Privacy, May 2001, pp. 202-213.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.2
Li, Q.3
Wetzel, S.4
-
13
-
-
17744381820
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, " in Proceedings of the Eurocrypt, 2004.
-
(2004)
Proceedings of the Eurocrypt
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
15
-
-
78651567954
-
-
E. Krichen, B. Dorizzi, Z. Sun, S. Garcia-Salicetti, and T. Tan, Guide to Biometric Reference Systems and Performance Evaluation. Springer- Verlag, 2008, ch. Iris Recognition, pp. 25-50.
-
E. Krichen, B. Dorizzi, Z. Sun, S. Garcia-Salicetti, and T. Tan, Guide to Biometric Reference Systems and Performance Evaluation. Springer- Verlag, 2008, ch. Iris Recognition, pp. 25-50.
-
-
-
-
17
-
-
48649087855
-
-
National Institute of Science and Technology NIST
-
National Institute of Science and Technology (NIST), "Iris Challenge Evaluation, " 2005, http://iris.nist.gov/ice.
-
(2005)
Iris Challenge Evaluation
-
-
-
19
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
February
-
J. Daugman, "The importance of being random: Statistical principles of iris recognition, " Pattern Recognition, vol. 36, no. 2, pp. 279-291, February 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
|