-
2
-
-
77956089879
-
Machine readable travel documents. Part 1: Machine readable passport, specifications for electronically enabled passports with biometric identification capabilities
-
ICAO Doc 9303
-
"Machine Readable Travel Documents. Part 1: Machine Readable Passport, Specifications for Electronically enabled Passports with Biometric Identification Capabilities", International Civil Aviation Organization. ICAO Doc 9303, 2006. http://www2.icao.int/en/MRTD/Pages/default.aspx
-
(2006)
International Civil Aviation Organization
-
-
-
3
-
-
35348832191
-
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An Elliptic Curve Processor Suitable For RFID-Tags", 2006. http://eprint.iacr.org/2006/227.pdf
-
(2006)
An Elliptic Curve Processor Suitable for RFID-Tags
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
5
-
-
77956065135
-
Justice and home affairs: EU standard specifications for security features and biometrics in passports and travel documents
-
"Justice and Home Affairs: EU standard specifications for security features and biometrics in passports and travel documents". Technical report, European Union (2006).
-
(2006)
Technical Report, European Union
-
-
-
6
-
-
41549094864
-
An on-line secure E-passport protocol
-
Chen, L., Mu, Y., Susilo, W., eds. Sydney, Australia, 2008, Proceedings. Volume 4991 of Lecture Notes in Computer Science., Springer 2008
-
V. Pasupathinathan, J. Pieprzyk, and H. Wang, "An on-line secure E-passport protocol", In Chen, L., Mu, Y., Susilo, W., eds.: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, 2008, Proceedings. Volume 4991 of Lecture Notes in Computer Science., Springer (2008), page(s): 14-28, 2008.
-
(2008)
Information security practice and experience, 4th International Conference, ISPEC 2008
, pp. 14-28
-
-
Pasupathinathan, V.1
Pieprzyk, J.2
Wang, H.3
-
7
-
-
77956086539
-
Towards a secure E-passport protocol based on biometrics
-
(Special Issue on Access Control and Protocols) June
-
M. Abid, and H. Afifi, "Towards a secure E-passport protocol based on biometrics", Journal of Information Assurance and Security JIAS, Volume 4, Issue 4 (Special Issue on Access Control and Protocols), page(s): 338-345, June 2009.
-
(2009)
Journal of Information Assurance and Security JIAS
, vol.4
, Issue.4
, pp. 338-345
-
-
Abid, M.1
Afifi, H.2
-
8
-
-
33947530278
-
Generating cancelable fingerprint templates
-
April
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Boll, "Generating cancelable fingerprint templates". IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4), page(s): 561-572, April 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Boll, R.M.4
-
9
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
November
-
A. T. B. Jin, D. Ngo, C. Ling, and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number", Pattern Recognition, 37(11), page(s): 2245-2255, November 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ngo, D.2
Ling, C.3
Goh, A.4
-
10
-
-
33750533142
-
An improved biohashing for human authentication
-
March
-
A. Lumini and L. Nanni, "An improved biohashing for human authentication", Pattern Recognition, 40(3), page(s): 1057-1065, March 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
12
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth and E. Teletar, editors IEEE Press
-
A. Juels and M. Sudan, "A fuzzy vault scheme", In A. Lapidoth and E. Teletar, editors, Proc. IEEE Int. Symp. Information Theory, page 408. IEEE Press, 2002.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
14
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively", IEEE Transactions on Computers, 55(9), page(s): 1081-1088, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
15
-
-
56749164763
-
Three factor scheme for biometric-based cryptographic key regeneration using iris
-
September
-
S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacrétaz, and B. Dorizzi, "Three factor scheme for biometric-based cryptographic key regeneration using iris", In The 6th Biometrics Symposium 2008 (BSYM2008), September 2008.
-
(2008)
The 6th Biometrics Symposium 2008 (BSYM2008)
-
-
Kanade, S.1
Camara, D.2
Krichen, E.3
Petrovska-Delacrétaz, D.4
Dorizzi, B.5
-
18
-
-
0001219865
-
Counting points on elliptic curves over finite fields
-
R. Schoof, "Counting points on Elliptic Curves over Finite Fields", Journal. de Theorie des Nombres de Bordeaux 7 (1995), page(s): 219-254.
-
(1995)
Journal. De Theorie des Nombres de Bordeaux
, vol.7
, pp. 219-254
-
-
Schoof, R.1
-
20
-
-
84889954476
-
-
Publisher Springer-Verlag, London ISBN 978-1-84800-291-3
-
D. Petrovska-Delacrétaz, G. Chollet, and B. Dorizzi, Guide to Biometric Reference Systems and Performance Evaluation, Publisher Springer-Verlag, London, 2009, ISBN 978-1-84800-291-3.
-
(2009)
Guide to Biometric Reference Systems and Performance Evaluation
-
-
Petrovska-Delacrétaz, D.1
Chollet, G.2
Dorizzi, B.3
-
21
-
-
77956073390
-
-
National Institute of Science and Technology (NIST)
-
National Institute of Science and Technology (NIST). Iris Challenge Evauation, 2005. http://iris.nist.gov/ice
-
(2005)
Iris Challenge Evauation
-
-
|