-
1
-
-
34548064425
-
Secure remote authentication using biometric data
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith. Secure remote authentication using biometric data. In Eurocrypt, 2005.
-
(2005)
Eurocrypt
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
2
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Washington DC, USA, ACM Press
-
Xavier Boyen. Reusable cryptographic fuzzy extractors. In ACM CCS, pages 82-91, Washington DC, USA, 2004. ACM Press.
-
(2004)
ACM CCS
, pp. 82-91
-
-
Boyen, X.1
-
3
-
-
77649253271
-
Secure sketch for multi-set difference. Cryptology ePrint Archive
-
Report 2006/090
-
Ee-Chien Chang, Vadym Fedyukovych, and Qiming Li. Secure sketch for multi-set difference. Cryptology ePrint Archive, Report 2006/090, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Chang, E.-C.1
Fedyukovych, V.2
Li, Q.3
-
4
-
-
34247393528
-
Small secure sketch for point-set difference. Cryptology ePrint Archive
-
Report 2005/145
-
Ee-Chien Chang and Qiming Li. Small secure sketch for point-set difference. Cryptology ePrint Archive, Report 2005/145, 2005. http://eprint.iacr.org/.
-
(2005)
-
-
Chang, E.-C.1
Li, Q.2
-
5
-
-
33746049783
-
Hiding secret points amidst chaff
-
Eurocrypt, of
-
Ee-Chien Chang and Qiming Li. Hiding secret points amidst chaff. In Eurocrypt, volume 4004 of LNCS, pages 59-72, 2006.
-
(2006)
LNCS
, vol.4004
, pp. 59-72
-
-
Chang, E.-C.1
Li, Q.2
-
6
-
-
0026746934
-
Human face recognition method based on the statistical model of small sample size
-
Yong-Qing Cheng. Human face recognition method based on the statistical model of small sample size. In SPIE Proc. Intell. Robot and Compu. Vision, pages 85-95, 1991.
-
(1991)
SPIE Proc. Intell. Robot and Compu. Vision
, pp. 85-95
-
-
Cheng, Y.-Q.1
-
7
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Eurocrypt, of, Springer-Verlag
-
Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocrypt, volume 3027 of LNCS, pages 523-540. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
33750918446
-
Combining cryptography with biometrics effectively
-
Technical Report UCAM-CL-TR-640, University of Cambridge
-
Feng Hao, Ross Anderson, and John Daugman. Combining cryptography with biometrics effectively. Technical Report UCAM-CL-TR-640, University of Cambridge, 2005.
-
(2005)
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
10
-
-
0025794601
-
Algebraic feature extraction of image for recognition
-
Z. Hong. Algebraic feature extraction of image for recognition. Pattern Recognition, 24:211-219, 1991.
-
(1991)
Pattern Recognition
, vol.24
, pp. 211-219
-
-
Hong, Z.1
-
12
-
-
0033281339
-
A fuzzy commitment scheme
-
Ari Juels and Martin Wattenberg. A fuzzy commitment scheme. In ACM CCS, pages 28-36, 1999.
-
(1999)
ACM CCS
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
13
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J.-P. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA, pages 393-402, 2003.
-
(2003)
AVBPA
, pp. 393-402
-
-
Linnartz, J.-P.1
Tuyls, P.2
-
14
-
-
0009801824
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Ueli Maurer and Stefan Wolf. Information-theoretic key agreement: From weak to strong secrecy for free. In Eurocrypt, 2000.
-
(2000)
Eurocrypt
-
-
Maurer, U.1
Wolf, S.2
-
17
-
-
33748076787
-
A secure biometric authentication scheme based on robust hashing
-
Y. Sutcu, T. Sencar, and N. Memon. A secure biometric authentication scheme based on robust hashing. In ACM MM-SEC Workshop, 2005.
-
(2005)
ACM MM-SEC Workshop
-
-
Sutcu, Y.1
Sencar, T.2
Memon, N.3
-
18
-
-
26444507172
-
Practical biometric authentication with template protection
-
P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.J. Schrijen, A.M. Bazen, and R.N.J. Veldhuis. Practical biometric authentication with template protection. In AVBPA, pages 436-446, 2005.
-
(2005)
AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
19
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
P. Tuyls and J. Goseling. Capacity and examples of template-protecting biometric authentication systems. In ECCV Workshop BioAW, pages 158-170, 2004.
-
(2004)
ECCV Workshop BioAW
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
|