-
1
-
-
31344435929
-
Cryptographic processors-a survey
-
Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.P.: Cryptographic processors-a survey. Proceedings of the IEEE 94(2), 357-369 (2006)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.P.4
-
2
-
-
24944501364
-
Secure remote authentication using biometric data
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005) (Pubitemid 41313951)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
3
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G.: Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 3(4), 673-683 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
4
-
-
52049107821
-
Biometric binary string generation with detection rate optimized bit allocation
-
Chen, C., Veldhuis, R.N.J., Kevenaar, T.A.M., Akkermans, A.H.M.: Biometric binary string generation with detection rate optimized bit allocation. In: IEEE CVPR 2008, Workshop on Biometrics, June 2008, pp. 1-7 (2008)
-
IEEE CVPR 2008, Workshop on Biometrics, June 2008
, vol.2008
, pp. 1-7
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
5
-
-
64549109673
-
-
ICARCV, IEEE, Los Alamitos
-
Chen, C., Veldhuis, R.N.J.: Performances of the likelihood-ratio classifier based on different data modelings. In: ICARCV, pp. 1347-1351. IEEE, Los Alamitos (2008)
-
(2008)
Performances of the Likelihood-ratio Classifier Based on Different Data Modelings
, pp. 1347-1351
-
-
Chen, C.1
Veldhuis, R.N.J.2
-
6
-
-
26444573772
-
Approximate message authentication and biometric entity authentication
-
Patrick, A.S., Yung, M. (eds.) FC 2005. Springer, Heidelberg
-
Crescenzo, G.D., Graveman, R., Ge, R., Arce, G.: Approximate message authentication and biometric entity authentication. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 240-254. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3570
, pp. 240-254
-
-
Crescenzo, G.D.1
Graveman, R.2
Ge, R.3
Arce, G.4
-
7
-
-
1342275940
-
-
Maltoni, A.K.J.D., Maio, D., Prabhakar, S. (eds.): Springer, Heidelberg
-
Maltoni, A.K.J.D., Maio, D., Prabhakar, S. (eds.): Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
-
(2003)
Handbook of Fingerprint Recognition
-
-
-
8
-
-
33749541274
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 232-250. Springer, Heidelberg (2006) (Pubitemid 44532119)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117 LNCS
, pp. 232-250
-
-
Dodis, Y.1
Katz, J.2
Reyzin, L.3
Smith, A.4
-
9
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
10
-
-
44049109285
-
A fast search algorithm for a large fuzzy database
-
DOI 10.1109/TIFS.2008.920726, 4483672
-
Hao, F., Daugman, J., Zielinski, P.: A fast search algorithm for a large fuzzy database. IEEE Transactions on Information Forensics and Security 3(2), 203-212 (2008) (Pubitemid 351709454)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 203-212
-
-
Hao, F.1
Daugman, J.2
Zielinski, P.3
-
12
-
-
67549112684
-
-
IEEE BTAS 2008
-
Kelkboom, E.J.C., Molina, G.G., Kevenaar, T.A.M., Veldhuis, R.N.J., Jonker, W.: Binary biometrics: An analytic framework to estimate the bit error probability under gaussian assumption. In: IEEE BTAS 2008, pp. 1-6 (2008)
-
(2008)
Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption
, pp. 1-6
-
-
Kelkboom, E.J.C.1
Molina, G.G.2
Kevenaar, T.A.M.3
Veldhuis, R.N.J.4
Jonker, W.5
-
13
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. Springer, Heidelberg
-
Linnartz, J.-P.M.G., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
14
-
-
0036522407
-
FVC2000: Fingerprint verification competition
-
Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 402-412 (2002)
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
17
-
-
26444507172
-
Practical biometric authentication with template protection
-
Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. Springer, Heidelberg
-
Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436-446. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
18
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
Maltoni, D., Jain, A.K. (eds.) BioAW 2004. Springer, Heidelberg
-
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158-170. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3087
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
19
-
-
77951548349
-
-
EUSIPCO 2004
-
Tuyls, P., Verbitskiy, E., Goseling, J., Denteneer, D.: Privacy protecting biometric authentication systems: an overview. In: EUSIPCO 2004 (2004)
-
(2004)
Privacy Protecting Biometric Authentication Systems: An Overview
-
-
Tuyls, P.1
Verbitskiy, E.2
Goseling, J.3
Denteneer, D.4
-
20
-
-
68549104046
-
Physical security devices for computer subsystems: A survey of attacks and defenses
-
Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
-
Weingart, S.H.: Physical security devices for computer subsystems: A survey of attacks and defenses. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 302-317. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1965
, pp. 302-317
-
-
Weingart, S.H.1
|