-
1
-
-
43949116287
-
Biometric template security
-
A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process, vol. 2008, pp. 1-17, 2008.
-
(2008)
EURASIP J. Adv. Signal Process
, vol.2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
2
-
-
85008014515
-
Biometric security solutions
-
K. W. Webb, "Biometric security solutions," IEEE Security and Privacy, vol. 3, p. 7, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, pp. 7
-
-
Webb, K.W.1
-
3
-
-
0033730804
-
Filterbank-based fingerprint matching
-
A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Filterbank- based fingerprint matching," IEEE Transactions on Image Processing, vol. 9, pp. 846-859, 2000.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, pp. 846-859
-
-
Jain, A.K.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
4
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
M. Barni, T. Bianchi, D. Catalano, M. D. Raimondo, R. D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "Privacy-preserving fingercode authentication," in 12th ACM Multi- media and Security Workshop, 2010.
-
(2010)
12th ACM Multi- Media and Security Workshop
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Raimondo, M.D.4
Labati, R.D.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
Piva, A.11
-
5
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
dec.
-
A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 28, no. 12, pp. 1892-1901, dec. 2006.
-
(2006)
Pattern Analysis and Machine Intelligence, IEEE Transactions on
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Goh, A.2
Ngo, D.3
-
6
-
-
33748422480
-
Empirical tests on biohashing
-
L. Nanni and A. Lumini, "Empirical tests on biohashing," Neurocomputing, vol. 69, no. 16-18, pp. 2390 - 2395, 2006.
-
(2006)
Neurocomputing
, vol.69
, Issue.16-18
, pp. 2390-2395
-
-
Nanni, L.1
Lumini, A.2
-
7
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561-572, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
8
-
-
70450172561
-
Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data
-
S. Kanade, D. Petrovska-Delacretaz, and B. Dorizzi, "Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data," Computer Vision and Pattern Recognition, IEEE Computer Society Conference on, pp. 120-127, 2009.
-
(2009)
Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
, pp. 120-127
-
-
Kanade, S.1
Petrovska-Delacretaz, D.2
Dorizzi, B.3
-
9
-
-
77949786186
-
On the security of non-invertible fingerprint template transforms
-
A. Nagar and A. Jain, "On the security of non-invertible fingerprint template transforms," in Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on, 6-9 2009, pp. 81-85.
-
(2009)
Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on
, vol.6-9
, pp. 81-85
-
-
Nagar, A.1
Jain, A.2
-
12
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
78650375346
-
-
March
-
S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, and F. Scotti, "Metodo di generazione e di verifica di una informazione di sicurezza ottenuta mediante letture biometriche," March 2006.
-
(2006)
Metodo di Generazione e di Verifica di Una Informazione di Sicurezza Ottenuta Mediante Letture Biometriche
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sana, D.4
Sassi, R.5
Scotti, F.6
-
14
-
-
70450245646
-
Multibiometric cryptosystem: Model structure and performance analysis
-
dec.
-
B. Fu, S. Yang, J. Li, and D. Hu, "Multibiometric cryptosystem: Model structure and performance analysis," Information Forensics and Security, IEEE Transactions on, vol. 4, no. 4, pp. 867-882, dec. 2009.
-
(2009)
Information Forensics and Security, IEEE Transactions on
, vol.4
, Issue.4
, pp. 867-882
-
-
Fu, B.1
Yang, S.2
Li, J.3
Hu, D.4
-
15
-
-
53149141806
-
Fuzzy vault crypto biometric key based on fingerprint vector features
-
M. AlTarawneh, W. Woo, and S. Dlay, "Fuzzy vault crypto biometric key based on fingerprint vector features," in Communication Systems, Networks and Digital Signal Processing, 2008. CNSDSP 2008. 6th International Symposium on, 25-25 2008, pp. 452-456.
-
(2008)
Communication Systems, Networks and Digital Signal Processing, 2008. CNSDSP 2008. 6th International Symposium on
, vol.25
, pp. 452-456
-
-
Altarawneh, M.1
Woo, W.2
Dlay, S.3
-
16
-
-
77955557689
-
Cancellable biometrics and userdependent multi-state discretization in biohash
-
A. Teoh, W. Yip, and K.-A. Toh, "Cancellable biometrics and userdependent multi-state discretization in biohash," Pattern Analysis & Applications.
-
Pattern Analysis & Applications
-
-
Teoh, A.1
Yip, W.2
Toh, K.-A.3
-
17
-
-
69949163699
-
Privacy-preserving face recognition
-
Berlin, Heidelberg: Springer-Verlag
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 235-253.
-
(2009)
PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
18
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
ser. LNCS, Springer-Verlag, December 2-4, full version available at
-
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. LNCS, vol. 5984. Springer-Verlag, December 2-4, 2009, pp. 235-253, full version available at http://eprint.iacr.org/2009/507.
-
(2009)
ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology
, vol.5984
, pp. 235-253
-
-
Sadeghi, A.1
Schneider, T.2
Wehrenberg, I.3
-
19
-
-
78650392298
-
-
Report 2010/079, [Online]. Available: http://thomaschneider.de/papers/ KSS10.pdf
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Modular design of efficient secure function evaluation protocols," Cryptology ePrint Archive, Report 2010/079, 2010, http://eprint.iacr.org/2010/079/. [Online]. Available: http://thomaschneider.de/papers/KSS10.pdf.
-
(2010)
Modular Design of Efficient Secure Function Evaluation Protocols
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
21
-
-
78650411084
-
-
B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds., SPIE
-
A. Stoianov, "Cryptographically secure biometrics," B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds., vol. 7667, no. 1. SPIE, 2010, p. 76670C.
-
(2010)
Cryptographically Secure Biometrics
, vol.7667
, Issue.1
-
-
Stoianov, A.1
-
22
-
-
38149070898
-
An application of the goldwasser-micali cryptosystem to biometric authentication
-
Berlin, Heidelberg: Springer-Verlag
-
J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang, and S. Zimmer, "An application of the goldwasser-micali cryptosystem to biometric authentication," in ACISP'07: Proceedings of the 12th Australasian conference on Information security and privacy. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 96-106.
-
(2007)
ACISP'07: Proceedings of the 12th Australasian Conference on Information Security and Privacy
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachène, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
25
-
-
69949129067
-
Efficient biometric verification in encrypted domain
-
Berlin, Heidelberg: Springer-Verlag
-
M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, "Efficient biometric verification in encrypted domain," in ICB '09: Proceedings of the Third International Conference on Advances in Biometrics. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 899-908.
-
(2009)
ICB '09: Proceedings of the Third International Conference on Advances in Biometrics
, pp. 899-908
-
-
Upmanyu, M.1
Namboodiri, A.M.2
Srinathan, K.3
Jawahar, C.V.4
-
26
-
-
77952587150
-
Blind authentication: A secure crypto-biometric verification protocol
-
june
-
M. Upmanyu, A. Namboodiri, K. Srinathan, and C. Jawahar, "Blind authentication: A secure crypto-biometric verification protocol," Information Forensics and Security, IEEE Transactions on, vol. 5, no. 2, pp. 255-268, june 2010.
-
(2010)
Information Forensics and Security, IEEE Transactions on
, vol.5
, Issue.2
, pp. 255-268
-
-
Upmanyu, M.1
Namboodiri, A.2
Srinathan, K.3
Jawahar, C.4
-
27
-
-
1342275940
-
-
Secaucus, NJ, USA: Springer-Verlag New York, Inc.
-
A. K. Jain and D. Maltoni, Handbook of Fingerprint Recognition. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2003.
-
(2003)
Handbook of Fingerprint Recognition
-
-
Jain, A.K.1
Maltoni, D.2
-
28
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
29
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Proceedings of CRYPTO 84 on Advances in cryptology, 1985, pp. 10-18.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 10-18
-
-
El Gamal, T.1
|