-
2
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
ACM Press, New York
-
Boyen X. Reusable cryptographic fuzzy extractors. ACM CCS 2004 (2004), ACM Press, New York 82-91
-
(2004)
ACM CCS 2004
, pp. 82-91
-
-
Boyen, X.1
-
3
-
-
24944501364
-
Secure remote authentication using biometric data
-
Springer, Berlin
-
Boyen X., Dodis Y., Katz J., Ostrovsky R., and Smith A. Secure remote authentication using biometric data. EUROCRYPT (2005), Springer, Berlin 147-163
-
(2005)
EUROCRYPT
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
4
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Bringer J., Chabanne H., Cohen G., Kindarji B., and Zemor G. Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 3 4 (2008) 673-683
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
5
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
Singapore. New York: ACM;
-
Buhan I, Doumen J, Hartel P, Veldhuis R. Fuzzy extractors for continuous distributions. In: Proceedings of the second ACM symposium on information, computer and communications security (ASIACCS), Singapore. New York: ACM; 2007. p. 353-5.
-
(2007)
Proceedings of the second ACM symposium on information, computer and communications security (ASIACCS)
, pp. 353-355
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
7
-
-
0004116989
-
-
MIT Press and McGraw-Hill, Cambridge, MA and New York [Chapter 15]
-
Cormen T.H., Leiserson C.E., Rivest R.L., and Stein C. Introduction to algorithms. 2nd ed (2001), MIT Press and McGraw-Hill, Cambridge, MA and New York [Chapter 15]
-
(2001)
Introduction to algorithms. 2nd ed
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
8
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Springer, Berlin
-
Dodis Y., Reyzin L., and Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Advances in crypology-eurocrypt vol. 3027 (2004), Springer, Berlin 523-540
-
(2004)
Advances in crypology-eurocrypt
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
11
-
-
67650091706
-
A multiple-control fuzzy vault
-
Hirschbichler M, Boyd C, Boles W. A multiple-control fuzzy vault. In: Sixth annual conference on privacy, security and trust, PST '08, 2008. p. 36-47.
-
(2008)
Sixth annual conference on privacy, security and trust, PST '08
, pp. 36-47
-
-
Hirschbichler, M.1
Boyd, C.2
Boles, W.3
-
14
-
-
0033640646
-
Statistical pattern recognition: a review
-
URL: 〈citeseer.ist.psu.edu/article/jain00statistical.html〉
-
Jain A.K., Duin R.P.W., and Mao J. Statistical pattern recognition: a review. IEEE Transactions on Pattern Analysis and Machine Intelligence 22 1 (2000) 4-37. http://citeseer.ist.psu.edu/article/jain00statistical.html URL: 〈citeseer.ist.psu.edu/article/jain00statistical.html〉
-
(2000)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, Issue.1
, pp. 4-37
-
-
Jain, A.K.1
Duin, R.P.W.2
Mao, J.3
-
15
-
-
22844450724
-
A minutia-based partial fingerprint recognition system
-
Jea T.-Y., and Govindaraju V. A minutia-based partial fingerprint recognition system. Pattern Recognition 38 (2005) 1672-1684
-
(2005)
Pattern Recognition
, vol.38
, pp. 1672-1684
-
-
Jea, T.-Y.1
Govindaraju, V.2
-
19
-
-
34547103253
-
Alignment-free cancelable fingerprint templates based on local minutiae information
-
Lee C., Choi J.-Y., Toh K.-A., and Lee S. Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Transactions Systems, Man, and Cybernetics, Part B: Cybernetics 37 4 (2007) 980-992
-
(2007)
IEEE Transactions Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.37
, Issue.4
, pp. 980-992
-
-
Lee, C.1
Choi, J.-Y.2
Toh, K.-A.3
Lee, S.4
-
20
-
-
52349122571
-
A new method for generating an invariant iris private key based on the fuzzy vault system
-
Lee Y.J., Park K.R., Lee S.J., Bae K., and Kim J. A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Transactions on Systems Man and Cybernetics Part B: Cybernetics 38 5 (2008) 1302-1313
-
(2008)
IEEE Transactions on Systems Man and Cybernetics Part B: Cybernetics
, vol.38
, Issue.5
, pp. 1302-1313
-
-
Lee, Y.J.1
Park, K.R.2
Lee, S.J.3
Bae, K.4
Kim, J.5
-
21
-
-
77957955045
-
-
Li J, Yang X, Tian J, Shi P, Li P. Topological structure-based alignment for fingerprint fuzzy vault. In: Proceedings of 19th international conference on pattern recognition, ICPR 2008, 2008a. p. 1-4.
-
Li J, Yang X, Tian J, Shi P, Li P. Topological structure-based alignment for fingerprint fuzzy vault. In: Proceedings of 19th international conference on pattern recognition, ICPR 2008, 2008a. p. 1-4.
-
-
-
-
23
-
-
69949120155
-
Security-enhanced fuzzy fingerprint vault based on minutiae's local ridge information
-
Li P, Yang X, Cao K, Shi P, Tian J. Security-enhanced fuzzy fingerprint vault based on minutiae's local ridge information. In: Proceedings of the 3rd international conference of biometrics, ICB'09. 2009: p. 930-9.
-
(2009)
Proceedings of the 3rd international conference of biometrics, ICB'09
, pp. 930-939
-
-
Li, P.1
Yang, X.2
Cao, K.3
Shi, P.4
Tian, J.5
-
25
-
-
77649250983
-
Secure sketch for biometric templates
-
Springer, Berlin
-
Li Q., Sutcu Y., and Memon N. Secure sketch for biometric templates. Asiacrypt (2006), Springer, Berlin 99-113
-
(2006)
Asiacrypt
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
26
-
-
71349083432
-
-
Maiorana E. Biometric cryptosystem using function based on-line signature recognition. Expert Systems with Applications 2010;37(4):3454-61
-
Maiorana E. Biometric cryptosystem using function based on-line signature recognition. Expert Systems with Applications 2010;37(4):3454-61
-
-
-
-
27
-
-
1342275940
-
-
Springer, London
-
Maltoni D., Maio D., Jain A., and Prabhakar S. Handbook of fingerprint recognition. 2nd ed. (2009), Springer, London
-
(2009)
Handbook of fingerprint recognition. 2nd ed.
-
-
Maltoni, D.1
Maio, D.2
Jain, A.3
Prabhakar, S.4
-
28
-
-
0040833010
-
The ziggurat method for generating random variables
-
URL: 〈http://www.jstatsoft.org/v05/i08/〉
-
Marsaglia G., and Tsang W. The ziggurat method for generating random variables. Journal of Statistical Software 5 8 (2000). http://www.jstatsoft.org/v05/i08/ URL: 〈http://www.jstatsoft.org/v05/i08/〉
-
(2000)
Journal of Statistical Software
, vol.5
, Issue.8
-
-
Marsaglia, G.1
Tsang, W.2
-
29
-
-
77957941531
-
-
Nagar A, Nandakumar K, Jain A. Securing fingerprint template: fuzzy vault with minutiae descriptors. In: Proceedings of 19th international conference on pattern recognition, ICPR 2008, 2008. p. 1-4.
-
Nagar A, Nandakumar K, Jain A. Securing fingerprint template: fuzzy vault with minutiae descriptors. In: Proceedings of 19th international conference on pattern recognition, ICPR 2008, 2008. p. 1-4.
-
-
-
-
31
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Ratha N., Chikkerur S., Connell J., and Bolle R. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29 4 (2007) 561-572
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.3
Bolle, R.4
-
32
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communication of ACM 22 11 (1979) 612-613
-
(1979)
Communication of ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
44049084315
-
Template-free biometric-key generation by means of fuzzy genetic clustering
-
Sheng W., Howells G., Fairhurst M., and Deravi F. Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Transactions on Information Forensics and Security 3 2 (2008) 183-191
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 183-191
-
-
Sheng, W.1
Howells, G.2
Fairhurst, M.3
Deravi, F.4
-
35
-
-
0032224440
-
Biometric encryption using image processing
-
Soutar C, Roverge D, Stojanov SA, Gilroy R, Kumar BVKV. Biometric encryption using image processing. In: Proceeding of the SPIE-optical secur. and count. deter. tech., vol. 3314, 1998. p. 178-88.
-
(1998)
Proceeding of the SPIE-optical secur. and count. deter. tech
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roverge, D.2
Stojanov, S.A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
40
-
-
10044222391
-
Biometric cryptosystems: issues and challenges
-
Uludag U., Pankanti S., Prabhakar S., and Jain A. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92 6 (2004) 948-960
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.4
-
41
-
-
50249133245
-
Fuzzy vault for face based cryptographic key generation
-
Wang Y, Plataniotis K. Fuzzy vault for face based cryptographic key generation. In: Biometrics symposium, 2007. p. 1-6.
-
(2007)
Biometrics symposium
, pp. 1-6
-
-
Wang, Y.1
Plataniotis, K.2
-
42
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
Yang S, Verbauwhede I. Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings of 2005 IEEE international conference on acoustics, speech, and signal (ICASSP '05), vol. 5, 2005. p. 609-12.
-
(2005)
Proceedings of 2005 IEEE international conference on acoustics, speech, and signal (ICASSP '05)
, vol.5
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
|