-
1
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. Springer-Verlag, December 2-4, full version available at
-
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. LNCS, vol. 5984. Springer-Verlag, December 2-4, 2009, pp. 235-253, full version available at http://eprint.iacr.org/2009/507.
-
(2009)
LNCS
, vol.5984
, pp. 235-253
-
-
Sadeghi, A.1
Schneider, T.2
Wehrenberg, I.3
-
2
-
-
0003987134
-
-
A. K. Jain, Ed. Norwell, MA, USA: Kluwer Academic Publishers
-
R. Bolle and S. Pankanti, Biometrics: Personal Identification in Networked Society, A. K. Jain, Ed. Norwell, MA, USA: Kluwer Academic Publishers, 1998.
-
(1998)
Biometrics: Personal Identification in Networked Society
-
-
Bolle, R.1
Pankanti, S.2
-
3
-
-
69949163699
-
Privacy-preserving face recognition
-
Berlin, Heidelberg: Springer-Verlag
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 235-253.
-
(2009)
PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
4
-
-
0033730804
-
Filterbank-based fingerprint matching
-
May
-
A. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Filterbank-based fingerprint matching," Image Processing, IEEE Transactions on, vol. 9, no. 5, pp. 846-859, May 2000.
-
(2000)
Image Processing, IEEE Transactions on
, vol.9
, Issue.5
, pp. 846-859
-
-
Jain, A.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
5
-
-
1342275940
-
-
Springer Publishing Company, Incorporated
-
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer Publishing Company, Incorporated, 2009.
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
6
-
-
0031233235
-
An identity-authentication system using fingerprints
-
A. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identity-authentication system using fingerprints." Proc. IEEE, 85, (9), pp. 1364-1388, 1997.
-
(1997)
Proc. IEEE
, vol.85
, Issue.9
, pp. 1364-1388
-
-
Jain, A.1
Hong, L.2
Pankanti, S.3
Bolle, R.4
-
7
-
-
0034135212
-
Effect of resolution and image quality on combined optical and neural network fingerprint matching
-
C. L. Wilson, C. Watson, , and E. Peak, "Effect of resolution and image quality on combined optical and neural network fingerprint matching," Putt. Recognit., 33, (Z), pp. 317-331, 2000.
-
(2000)
Putt. Recognit.
, vol.33
, Issue.Z
, pp. 317-331
-
-
Wilson, C.L.1
Watson, C.2
Peak, E.3
-
8
-
-
0033076475
-
Fingerprint feature extraction using gabor filters
-
C. Lee and S. Wang, "Fingerprint feature extraction using gabor filters," Eleclron. Lett., 35, (4), pp. 288-290, 1999.
-
(1999)
Eleclron. Lett.
, vol.35
, Issue.4
, pp. 288-290
-
-
Lee, C.1
Wang, S.2
-
9
-
-
33845461931
-
An efficient algorithm for fingercode-based biometric identification
-
H.-W. Sun, K.-Y. Lam, M. Gu, and J.-G. Sun, "An efficient algorithm for fingercode-based biometric identification," in OTM Workshops (1), 2006, pp. 469-478.
-
(2006)
OTM Workshops (1)
, pp. 469-478
-
-
Sun, H.-W.1
Lam, K.-Y.2
Gu, M.3
Sun, J.-G.4
-
10
-
-
0032663330
-
A multichannel approach to fingerprint classification
-
Apr
-
A. Jain, S. Prabhakar, and L. Hong, "A multichannel approach to fingerprint classification," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 21, no. 4, pp. 348-359, Apr 1999.
-
(1999)
Pattern Analysis and Machine Intelligence, IEEE Transactions on
, vol.21
, Issue.4
, pp. 348-359
-
-
Jain, A.1
Prabhakar, S.2
Hong, L.3
-
11
-
-
0026384289
-
Face recognition using eigenfaces
-
M. Turk and A. Pentland, "Face recognition using eigenfaces," in Computer Vision and Pattern Recognition, 1991. Proceedings CVPR '91., IEEE Computer Society Conference on, 1991, pp. 586-591.
-
(1991)
Computer Vision and Pattern Recognition, 1991. Proceedings CVPR '91., IEEE Computer Society Conference on
, pp. 586-591
-
-
Turk, M.1
Pentland, A.2
-
12
-
-
78149232330
-
Nist recommendation for key management
-
ser. August
-
"Nist recommendation for key management," ser. NIST Special Publication, vol. 800-57, August 2005.
-
(2005)
NIST Special Publication
, vol.800
, Issue.57
-
-
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
EUROCRYPT'99, ser. J. Stern, Ed., Springer-Verlag, Berlin, Germany, May
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT'99, ser. LNCS, J. Stern, Ed., vol. 1592. Springer-Verlag, Berlin, Germany, May 1999, pp. 223-238.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
38149074802
-
Efficient and secure comparison for on-line auctions
-
ACISP, ser. J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Springer
-
I. Damgård, M. Geisler, and M. Krøigard, "Efficient and secure comparison for on-line auctions," in ACISP, ser. Lecture Notes in Computer Science, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., vol. 4586. Springer, 2007, pp. 416-430.
-
(2007)
Lecture Notes in Computer Science
, vol.4586
, pp. 416-430
-
-
Damgård, I.1
Geisler, M.2
Krøigard, M.3
-
15
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme
-
IEEE Computer Society Press, Oct.
-
J. Cohen and M. Fischer, "A robust and verifiable cryptographically secure election scheme," in 26th FOCS. IEEE Computer Society Press, Oct. 1985.
-
(1985)
26th FOCS
-
-
Cohen, J.1
Fischer, M.2
-
16
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
CRYPTO'84, ser. G. R. Blakley and D. Chaum, Eds., Springer-Verlag, Berlin, Germany, Aug.
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in CRYPTO'84, ser. LNCS, G. R. Blakley and D. Chaum, Eds., vol. 196. Springer-Verlag, Berlin, Germany, Aug. 1985, pp. 10-18.
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
ElGamal, T.1
-
19
-
-
49049099825
-
Improved garbled circuit: Free xor gates and applications
-
Berlin, Heidelberg: Springer-Verlag
-
V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free xor gates and applications," in ICALP '08: Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 486-498.
-
(2008)
ICALP '08: Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Part II
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
20
-
-
72449131818
-
Secure two-party computation is practical
-
ASIACRYPT, ser. M. Matsui, Ed., Springer
-
B. Pinkas, T. Schneider, N. Smart, and S. Williams, "Secure two-party computation is practical," in ASIACRYPT, ser. Lecture Notes in Computer Science, M. Matsui, Ed., vol. 5912. Springer, 2009, pp. 250-267.
-
(2009)
Lecture Notes in Computer Science
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
-
21
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Berkeley, CA, USA: USENIX Association
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay - a secure two-party computation system," in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 20-20.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 20-20
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
22
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Philadelphia, PA, USA: Society for Industrial and Applied Mathematics
-
M. Naor and B. Pinkas, "Efficient oblivious transfer protocols," in SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, 2001, pp. 448-457
-
(2001)
SODA '01: Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
|