-
1
-
-
70449490810
-
-
Error-Tolerant Searchable Encryption. IEEE International Conference on Communication (ICC'09)
-
Bringer J, Chabanne H, Kindarji B. Error-Tolerant Searchable Encryption. IEEE International Conference on Communication (ICC'09), 2009.
-
(2009)
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
2
-
-
43949116287
-
-
Biometric template security. EURASIP Journal on Advances in Signal Processing (Jan. 2008), pp -
-
Jain AK, Nandakumar K, Nagar A. Biometric template security. EURASIP Journal on Advances in Signal Processing (Jan. 2008), pp 1-17, 2008.
-
(2008)
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
3
-
-
84863702244
-
-
Biometric template security: challenges and solutions. Proceedings of 13th European Signal Processing Conference (EUSIPCO), Antalya, Turkey
-
Jain AK, Ross A, Uludag U. Biometric template security: challenges and solutions. Proceedings of 13th European Signal Processing Conference (EUSIPCO), Antalya, Turkey, 2005.
-
(2005)
-
-
Jain, A.K.1
Ross, A.2
Uludag, U.3
-
5
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Daugman J. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 1993; 15(11): 1148-1161.
-
(1993)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
6
-
-
0032675768
-
-
Fingercode: a filterbank for fingerprint representation and matching. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'99)
-
Jain AK, Prabhakar S, Hong L, Pankanti S. Fingercode: a filterbank for fingerprint representation and matching. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'99) - Volume 2, pp 2187, 2009.
-
(2009)
, vol.2
, pp. 2187
-
-
Jain, A.K.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
7
-
-
26444507172
-
Practical biometric authentication with template protection
-
Kanade T, Jain AK, Ratha NK (eds). Springer: Berlin/Heidelberg
-
Tuyls P, Akkermans AHM, Kevenaar TAM, Schrijen GJ, Bazen AM, Veldhuis RNJ. Practical biometric authentication with template protection. In AVBPA, Vol. 3546, Kanade T, Jain AK, Ratha NK (eds). Springer: Berlin/Heidelberg, 2005; 436-446.
-
(2005)
AVBPA
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
8
-
-
35048865463
-
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Cachin and Camenisch [49]
-
Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Cachin and Camenisch [49] 523-540.
-
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
0033281339
-
-
A fuzzy commitment scheme. ACM Conference on Computer and Communications Security
-
Juels A, Wattenberg M. A fuzzy commitment scheme. ACM Conference on Computer and Communications Security, 1999; 28-36.
-
(1999)
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
10
-
-
34548074162
-
Protecting biometric templates with sketch: theory and practice
-
DOI: 10.1109/TIFS.2007.902022
-
Sutcu Y, Li Q, Memon N. Protecting biometric templates with sketch: theory and practice. Information Forensics and Security, IEEE Transactions on 2007; 2(3): 503-512. DOI: 10.1109/TIFS.2007.902022
-
(2007)
Information Forensics and Security, IEEE Transactions on
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
11
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
Li SZ (eds). Springer: Berlin/Heidelberg
-
Nandakumar K, Nagar A, Jain AK. Hardening fingerprint fuzzy vault using password. In ICB, Lecture Notes in Computer Science, Vol. 4642, Lee SW, Li SZ (eds). Springer: Berlin/Heidelberg, 2007; 927-937.
-
(2007)
ICB, Lecture Notes in Computer Science
, vol.4642
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.K.3
Lee, S.W.4
-
12
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI: 10.1109/TC.2006.138
-
Hao F, Anderson R, Daugman J. Combining crypto with biometrics effectively. Computers, IEEE Transactions on 2006; 55(9): 1081-1088. DOI: 10.1109/TC.2006.138
-
(2006)
Computers, IEEE Transactions on
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
14
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G. Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 2008; 3(4): 673-683.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
15
-
-
56349139535
-
The best of both worlds: applying secure sketches to cancelable biometrics
-
Special Issue on Security and Trust).
-
Bringer J, Chabanne H, Kindarji B. The best of both worlds: applying secure sketches to cancelable biometrics. Science of Computer Programming 2008; 74(1-2): 43-51 (Special Issue on Security and Trust).
-
(2008)
Science of Computer Programming
, vol.74
, Issue.1-2
, pp. 43-51
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
16
-
-
69949156569
-
Securing fingerprint template: fuzzy vault with minutiae descriptors
-
Nagar A, Nandakumar K, Jain AK. Securing fingerprint template: fuzzy vault with minutiae descriptors. ICPR, IEEE, 2008; 1-4.
-
(2008)
ICPR, IEEE
, pp. 1-4
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
17
-
-
34748815127
-
An application of the Naccache-Stern knapsack cryptosystem to biometric authentication
-
Bringer J, Chabanne H, Tang Q. An application of the Naccache-Stern knapsack cryptosystem to biometric authentication. AutoID, IEEE, 2007; 180-185.
-
(2007)
AutoID, IEEE
, pp. 180-185
-
-
Bringer, J.1
Chabanne, H.2
Tang, Q.3
-
18
-
-
38149070898
-
An application of the Goldwasser-Micali cryptosystem to biometric authentication
-
Dawson E (eds). Springer: Berlin/Heidelberg
-
Bringer J, Chabanne H, Izabachène M, Pointcheval D, Tang Q, Zimmer S. An application of the Goldwasser-Micali cryptosystem to biometric authentication. In ACISP, Lecture Notes in Computer Science, Vol. 4586, Pieprzyk J, Ghodosi H, Dawson E (eds). Springer: Berlin/Heidelberg, 2007; 96-106.
-
(2007)
ACISP, Lecture Notes in Computer Science
, vol.4586
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachène, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
Pieprzyk, J.7
Ghodosi, H.8
-
19
-
-
38349176849
-
Extended private information retrieval and its application in biometrics authentications
-
Xing C (eds). Springer: Berlin/Heidelberg
-
Bringer J, Chabanne H, Pointcheval D, Tang Q. Extended private information retrieval and its application in biometrics authentications. In CANS, Lecture Notes in Computer Science, Vol. 4856, Bao F, Ling S, Okamoto T, Wang H, Xing C (eds). Springer: Berlin/Heidelberg, 2007; 175-193.
-
(2007)
CANS, Lecture Notes in Computer Science
, vol.4856
, pp. 175-193
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Tang, Q.4
Bao, F.5
Ling, S.6
Okamoto, T.7
Wang, H.8
-
20
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
Vaudenay S (ed.). Springer: Berlin/Heidelberg
-
Schoenmakers B, Tuyls P. Efficient binary conversion for Paillier encrypted values. In EUROCRYPT, Vol. 4004, Vaudenay S (ed.). Springer: Berlin/Heidelberg, 2006; 522-537.
-
(2006)
EUROCRYPT
, vol.4004
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
21
-
-
41549110945
-
A formal study of the privacy concerns in biometric-based remote authentication schemes
-
Susilo W (eds). Springer: Berlin/Heidelberg
-
Tang Q, Bringer J, Chabanne H, Pointcheval D. A formal study of the privacy concerns in biometric-based remote authentication schemes. In ISPEC, Lecture Notes in Computer Science, Vol. 4991, Chen L, Mu Y, Susilo W (eds). Springer: Berlin/Heidelberg, 2008; 56-70.
-
(2008)
ISPEC, Lecture Notes in Computer Science
, vol.4991
, pp. 56-70
-
-
Tang, Q.1
Bringer, J.2
Chabanne, H.3
Pointcheval, D.4
Chen, L.5
Mu, Y.6
-
22
-
-
69949129067
-
Efficient biometric verification in encrypted domain
-
Nixon MS (eds). Springer: Berlin/Heidelberg
-
Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV. Efficient biometric verification in encrypted domain. In ICB, Lecture Notes in Computer Science, Vol. 5558, Tistarelli M, Nixon MS (eds). Springer: Berlin/Heidelberg, 2009; 899-908.
-
(2009)
ICB, Lecture Notes in Computer Science
, vol.5558
, pp. 899-908
-
-
Upmanyu, M.1
Namboodiri, A.M.2
Srinathan, K.3
Jawahar, C.V.4
Tistarelli, M.5
-
23
-
-
45449114377
-
An authentication protocol with encrypted biometric data
-
Vaudenay S (ed.), Springer: Berlin/Heidelberg
-
Bringer J, Chabanne H. An authentication protocol with encrypted biometric data. In AFRICACRYPT, Lecture Notes in Computer Science, Vol. 5023, Vaudenay S (ed.), Springer: Berlin/Heidelberg, 2008; 109-124.
-
(2008)
AFRICACRYPT, Lecture Notes in Computer Science
, vol.5023
, pp. 109-124
-
-
Bringer, J.1
Chabanne, H.2
-
24
-
-
58049132058
-
An application of the boneh and shacham group signature scheme to biometric authentication
-
Fujisaki E (eds). Springer: Berlin/Heidelberg
-
Bringer J, Chabanne H, Pointcheval D, Zimmer S. An application of the boneh and shacham group signature scheme to biometric authentication. In IWSEC, Lecture Notes in Computer Science, Vol. 5312, Matsuura K, Fujisaki E (eds). Springer: Berlin/Heidelberg, 2008; 219-230.
-
(2008)
IWSEC, Lecture Notes in Computer Science
, vol.5312
, pp. 219-230
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Zimmer, S.4
Matsuura, K.5
-
25
-
-
24644489770
-
Nearest neighbors in high-dimensional spaces
-
2nd edition), Chapter 39, O'Rourke J (eds). CRC Press LLC, Boca Raton, FL, Avril
-
Indyk P. Nearest neighbors in high-dimensional spaces. Handbook of Discrete and Computational Geometry (2nd edition), Chapter 39, Goodman JE, O'Rourke J (eds). CRC Press LLC, Boca Raton, FL, Avril 2004.
-
(2004)
Handbook of Discrete and Computational Geometry
-
-
Indyk, P.1
Goodman, J.E.2
-
26
-
-
44049109285
-
A fast search algorithm for a large fuzzy database
-
DOI: 10.1109/TIFS.2008.920726
-
Hao F, Daugman J, Zielinski P. A fast search algorithm for a large fuzzy database. Information Forensics and Security, IEEE Transactions on 2008; 3(2): 203-212. DOI: 10.1109/TIFS.2008.920726
-
(2008)
Information Forensics and Security, IEEE Transactions on
, vol.3
, Issue.2
, pp. 203-212
-
-
Hao, F.1
Daugman, J.2
Zielinski, P.3
-
28
-
-
79954989867
-
-
Secure indexes. Cryptology ePrint Archive, Report 2003/216
-
Goh EJ. Secure indexes. Cryptology ePrint Archive, Report 2003/216 2003.
-
(2003)
-
-
Goh, E.J.1
-
29
-
-
33751031560
-
New constructions and practical applications for private stream searching (extended abstract)
-
Bethencourt J, Song DX, Waters B. New constructions and practical applications for private stream searching (extended abstract). IEEE Symposium on Security and Privacy, 2006; 132-139.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 132-139
-
-
Bethencourt, J.1
Song, D.X.2
Waters, B.3
-
30
-
-
33746214783
-
Efficient conjunctive keyword search on encrypted data storage system
-
Lioy A (eds). Springer: Berlin/Heidelberg
-
Byun JW, Lee DH, Lim J. Efficient conjunctive keyword search on encrypted data storage system. In EuroPKI, Vol. 4043, Atzeni AS, Lioy A (eds). Springer: Berlin/Heidelberg, 2006; 184-196.
-
(2006)
EuroPKI
, vol.4043
, pp. 184-196
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.3
Atzeni, A.S.4
-
31
-
-
33745922362
-
Public key encryption with keyword search based on K-resilient IBE
-
In (3), Choo H (eds). Springer: Berlin/Heidelberg
-
Khader D. Public key encryption with keyword search based on K-resilient IBE. In ICCSA (3), Vol. 3982, Gavrilova ML, Gervasi O, Kumar V, Tan CJK, Taniar D, Laganà A, Mun Y, Choo H (eds). Springer: Berlin/Heidelberg, 2006; 298-308.
-
(2006)
ICCSA
, vol.3982
, pp. 298-308
-
-
Khader, D.1
Gavrilova, M.L.2
Gervasi, O.3
Kumar, V.4
Tan, C.J.K.5
Taniar, D.6
Laganà, A.7
Mun, Y.8
-
32
-
-
35248839565
-
-
Efficient conjunctive keyword-searchable encryption. AINA Workshops (1), IEEE Computer Society).
-
Ryu EK, Takagi T. Efficient conjunctive keyword-searchable encryption. AINA Workshops (1), 2007; 409-414 (IEEE Computer Society).
-
(2007)
, pp. 409-414
-
-
Ryu, E.K.1
Takagi, T.2
-
33
-
-
38049138213
-
Skeith III WE. Public key encryption that allows PIR queries
-
Menezes A (ed.). Springer
-
Boneh D, Kushilevitz E, Ostrovsky R, Skeith III WE. Public key encryption that allows PIR queries. In CRYPTO, Vol. 4622, Menezes A (ed.). Springer, 2007; 50-67.
-
(2007)
CRYPTO
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
-
34
-
-
0031644241
-
Approximate nearest neighbors: towards removing the curse of dimensionality
-
Indyk P, Motwani R. Approximate nearest neighbors: towards removing the curse of dimensionality. Symposium on the Theory of Computing, 1998; 604-613.
-
(1998)
Symposium on the Theory of Computing
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
37
-
-
37549058056
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
Andoni A, Indyk P. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM 2008; 51(1): 117-122.
-
(2008)
Communications of the ACM
, vol.51
, Issue.1
, pp. 117-122
-
-
Andoni, A.1
Indyk, P.2
-
38
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom BH. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 1970; 13(7): 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
40
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
El Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. CRYPTO 1984; 10-18.
-
(1984)
CRYPTO
, pp. 10-18
-
-
El Gamal, T.1
-
41
-
-
84942550998
-
-
Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, Proceedings of EUROCRYPT'99, LCNS, Springer: Berlin/Heidelberg
-
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, Proceedings of EUROCRYPT'99, LCNS, Vol. 1592, Springer: Berlin/Heidelberg, 1999; 223-238.
-
(1999)
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
42
-
-
0032201622
-
Private information retrieval
-
Chor B, Kushilevitz E, Goldreich O, Sudan M. Private information retrieval. Journal of the ACM 1998; 45(6): 965-981.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
43
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Gertner Y, Ishai Y, Kushilevitz E, Malkin T. Protecting data privacy in private information retrieval schemes. STOC 1998; 151-160.
-
(1998)
STOC
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
44
-
-
26444512068
-
Single-database private information retrieval with constant communication rate
-
Yung M (eds). Springer: Berlin/Heidelberg
-
Gentry C, Ramzan Z. Single-database private information retrieval with constant communication rate. In ICALP, Lecture Notes in Computer Science, Vol. 3580, Caires L, Italiano GF, Monteiro L, Palamidessi C, Yung M (eds). Springer: Berlin/Heidelberg, 2005; 803-815.
-
(2005)
ICALP, Lecture Notes in Computer Science
, vol.3580
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
Caires, L.3
Italiano, G.F.4
Monteiro, L.5
Palamidessi, C.6
-
45
-
-
33645970169
-
-
In ISC, Bao F (eds). Springer: Berlin/Heidelberg
-
Lipmaa H. An oblivious transfer protocol with log-squared communication. In ISC, Vol. 3650, Zhou J, Lopez J, Deng RH, Bao F (eds). Springer: Berlin/Heidelberg, 2005; 314-328.
-
(2005)
An oblivious transfer protocol with log-squared communication
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
Zhou, J.2
Lopez, J.3
Deng, R.H.4
-
46
-
-
84947618820
-
-
A survey on private information retrieval.
-
Gasarch WI. A survey on private information retrieval.
-
-
-
Gasarch, W.I.1
-
47
-
-
0030714231
-
-
Private information storage (extended abstract). STOC
-
Ostrovsky R, Shoup V. Private information storage (extended abstract). STOC 1997; 294-303.
-
(1997)
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
48
-
-
79955030361
-
-
Skeith III WE. Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report 2007/064
-
Ostrovsky R, Skeith III WE. Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report 2007/064 2007.
-
(2007)
-
-
Ostrovsky, R.1
-
49
-
-
79955012614
-
-
Camenisch J (eds)., International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May 2004, Proceedings, LCNS, Springer: Berlin/Heidelberg
-
Cachinquery C, Camenisch J (eds). Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May 2004, Proceedings, LCNS, Vol. 3027, Springer: Berlin/Heidelberg, 2004.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, vol.3027
-
-
Cachinquery, C.1
-
50
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
51
-
-
84957626176
-
-
In CRYPTO, Springer: Berlin/Heidelberg
-
Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive secret sharing or: how to cope with perpetual leakage. In CRYPTO, Vol. 963, Springer: Berlin/Heidelberg, 1995; 339-352.
-
(1995)
Proactive secret sharing or: how to cope with perpetual leakage
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
|