-
1
-
-
43949116287
-
Biometric Template Security
-
A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric Template Security". EURASIP J. Adv. Signal Proc., v. 2008, pp. 1-17, 2008.
-
(2008)
EURASIP J. Adv. Signal Proc.
, vol.2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
2
-
-
84892363436
-
-
P. Tuyls, B. Škorić, and T. Kevenaar, eds., Springer-Verlag, London
-
P. Tuyls, B. Škorić, and T. Kevenaar, eds., "Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti- Counterfeiting". Springer-Verlag, London, 2007.
-
(2007)
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
-
-
-
3
-
-
84889618817
-
Biometric Encryption: The New Breed of Untraceable Biometrics
-
Chapter 26 in Boulgouris, N. V., Plataniotis, K. N., Micheli-Tzanakou, E., eds.: Wiley, London, in press
-
A. Cavoukian and A. Stoianov, "Biometric Encryption: The New Breed of Untraceable Biometrics." Chapter 26 in Boulgouris, N. V., Plataniotis, K. N., Micheli-Tzanakou, E., eds.: Biometrics: fundamentals, theory, and systems. Wiley, London, 2009, in press.
-
(2009)
Biometrics: Fundamentals, Theory, and Systems
-
-
Cavoukian, A.1
Stoianov, A.2
-
4
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle. "Enhancing security and privacy in biometrics-based authentication systems". IBM Syst. J., v. 40, No. 3, pp. 614-634, 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
5
-
-
26444554928
-
Vulnerabilities in Biometric Encryption Systems
-
Springer
-
A. Adler, "Vulnerabilities in Biometric Encryption Systems". LNCS, Springer, v..3546, pp. 1100-1109, 2005.
-
(2005)
LNCS
, vol.3546
, pp. 1100-1109
-
-
Adler, A.1
-
6
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Oct.
-
X. Boyen, "Reusable cryptographic fuzzy extractors." In 11th ACM Conf. CCS 2004, Washington, DC, pp. 82-91, Oct. 2004.
-
(2004)
11th ACM Conf. CCS 2004, Washington, DC
, pp. 82-91
-
-
Boyen, X.1
-
7
-
-
34247366845
-
Finding the Original Point Set Hidden among Chaff
-
E.-C. Chang, R. Shen, and F. W. Teo, "Finding the Original Point Set Hidden among Chaff". In Proc. ACM Symp. ASIACCS'06, Taipei, Taiwan. pp. 182-188, 2006.
-
(2006)
Proc. ACM Symp. ASIACCS'06, Taipei, Taiwan
, pp. 182-188
-
-
Chang, E.-C.1
Shen, R.2
Teo, F.W.3
-
9
-
-
8344236959
-
Biometric Encryption
-
Ch. 22, McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B.V.K. Vijaya Kumar, "Biometric Encryption." In ICSA Guide to Cryptography, Ch. 22, McGraw-Hill, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
10
-
-
42949167255
-
Realization of correlation attack against fuzzy vault scheme
-
A. Kholmatov and B. Yanikoglu, "Realization of correlation attack against fuzzy vault scheme." Proc. of SPIE, Vol. 6819, 2008.
-
(2008)
Proc. of SPIE
, vol.6819
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
11
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
March
-
I.R Buhan, J.M. Doumen, P.H. Hartel, and R.N.J. Veldhuis, "Fuzzy extractors for continuous distributions". In Proc. 2nd ACM Symp. ASIACCS, Singapore, pp. 353-355, March 2007.
-
(2007)
Proc. 2nd ACM Symp. ASIACCS, Singapore
, pp. 353-355
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
12
-
-
45449114377
-
An authentication protocol with encrypted biometric data
-
Springer
-
J. Bringer and H. Chabanne, "An authentication protocol with encrypted biometric data". LNCS, Springer, v. 5023, pp. 109-124, 2008.
-
(2008)
LNCS
, vol.5023
, pp. 109-124
-
-
Bringer, J.1
Chabanne, H.2
-
14
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Y. Dodis, L. Reyzin, and A. Smith. "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data". Proc. Eurocrypt 2004, pp. 523-540, 2004.
-
(2004)
Proc. Eurocrypt 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
15
-
-
33747624401
-
Combining Crypto with Biometrics Effectively
-
F. Hao, R. Anderson, and J. Daugman. "Combining Crypto with Biometrics Effectively". IEEE Trans. Comp., v. 55, pp. 1081-1088, 2006.
-
(2006)
IEEE Trans. Comp.
, vol.55
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
16
-
-
77952692379
-
-
IEEE BTAS'07
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor, "Optimal iris fuzzy sketches". In IEEE BTAS'07, 2007.
-
(2007)
Optimal Iris Fuzzy Sketches
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
17
-
-
33645656961
-
Face Biometrics with Renewable Templates
-
M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and Fei Zuo, "Face Biometrics with Renewable Templates". Proc. SPIE, v. 6072, 2006.
-
(2006)
Proc. SPIE
, vol.6072
-
-
Van Der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
18
-
-
26444507172
-
Practical Biometric Authentication with Template Protection
-
Springer
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G.-J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical Biometric Authentication with Template Protection". LNCS, v. 3546, pp. 436-446, Springer, 2005.
-
(2005)
LNCS
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
19
-
-
84962074661
-
Secure biometrics via syndromes
-
E. Martinian, S. Yekhanin, and J. S. Yedidia, "Secure biometrics via syndromes", in Allerton Conf. Comm., Control and Comp., Monticello, IL, Sep. 2005.
-
Allerton Conf. Comm., Control and Comp., Monticello, IL, Sep. 2005
-
-
Martinian, E.1
Yekhanin, S.2
Yedidia, J.S.3
-
20
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Oakland, Ca.
-
G.I. Davida, Y. Frankel, and B.J. Matt, "On enabling secure applications through off-line biometric identification." Proc. IEEE 1998 Symp. on Security and Privacy, pp. 148-157, Oakland, Ca., 1998.
-
(1998)
Proc. IEEE 1998 Symp. on Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
21
-
-
56749164763
-
Three factor scheme for biometric-based cryptographic key regeneration using iris
-
S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacretaz, and B. Dorizzi, "Three factor scheme for biometric-based cryptographic key regeneration using iris". In BSYM '08, Tampa, FL. Pp. 59-64, 2008.
-
(2008)
BSYM '08, Tampa, FL
, pp. 59-64
-
-
Kanade, S.1
Camara, D.2
Krichen, E.3
Petrovska-Delacretaz, D.4
Dorizzi, B.5
-
23
-
-
35148885090
-
Cancelable Biometrics Realization with Multispace Random Projections
-
A. B. J. Teoh and C. T. Yuang, " Cancelable Biometrics Realization With Multispace Random Projections". IEEE Trans. Systems, Man, And Cybernetics - Part B: Cybernetics, v. 37, No. 5, pp. 1096-1106, 2007.
-
(2007)
IEEE Trans. Systems, Man, and Cybernetics - Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.B.J.1
Yuang, C.T.2
|