-
3
-
-
26444448320
-
Cancellable key-based fingerprint templates
-
R. Ang, R. Safavi-Naini, L. McAven, "Cancellable key-based fingerprint templates," ACISP 2005, pp. 242-252.
-
(2005)
ACISP
, pp. 242-252
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
4
-
-
0037542969
-
-
Federal Information, Processing Standards Publication 197, Nov. 26
-
Announcing the Advanced Encryption Standard (AES), Federal Information, Processing Standards Publication 197, Nov. 26, 2001.
-
(2001)
Announcing the Advanced Encryption Standard (AES)
-
-
-
5
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
Y. J. Chang, Z. Wende, and T. Chen, "Biometrics-based cryptographic key generation," IEEE International Conference on Multimedia and Expo, vol. 3, pp. 2203-2206, 2004
-
(2004)
IEEE International Conference on Multimedia and Expo
, vol.3
, pp. 2203-2206
-
-
Chang, Y.J.1
Wende, Z.2
Chen, T.3
-
7
-
-
9944223229
-
Palmhashing: A novel approach for cancellable bio-metrics
-
T. Connie, A. Teoh, M. Goh, and D. Ngo, "Palmhashing: A novel approach for cancellable bio-metrics," Information processing letters, vol. 93, no. 1, pp. 1-5, 2005.
-
(2005)
Information processing letters
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
8
-
-
0003532271
-
UNIX password security-Ten years later
-
Springer-Verlag,, LNCS
-
D. Feldmeier, and P. Karn. "UNIX password security-Ten years later," Advances in Cryptology Crytpo '89, LNCS 435, pp. 44-63, Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology Crytpo '89
, vol.435
, pp. 44-63
-
-
Feldmeier, D.1
Karn, P.2
-
9
-
-
77958151410
-
A hybrid aApproach for face template protection
-
Orlando, USA
-
Y. C. Feng, P. C. Yuen, and A. K. Jain, "A hybrid aApproach for face template protection," Proceedings of SPIE Conference of Biometric Technology for Human Identification, Orlando, USA, vol. 6944, pp. ca. 325, 2008.
-
(2008)
Proceedings of SPIE Conference of Biometric Technology for Human Identification
, vol.6944
, pp. 325
-
-
Feng, Y.C.1
Yuen, P.C.2
Jain, A.K.3
-
10
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
Orlando, Fla, USA, Apr
-
M. F. Santos, J. F. Aguilar, and J. O. Garcia, "Cryptographic key generation using handwritten signature," Proceedings of SPIE, vol. 6202, pp. 225-231, Orlando, Fla, USA, Apr. 2006.
-
(2006)
Proceedings of SPIE
, vol.6202
, pp. 225-231
-
-
Santos, M.F.1
Aguilar, J.F.2
Garcia, J.O.3
-
11
-
-
84875339114
-
-
Gabor Filter. (http://en.wikipedia.org/wiki/Gaborfilter)
-
Gabor Filter
-
-
-
12
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, pp. 1081-1088, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
13
-
-
85139653721
-
-
CRC Press
-
L. C. Jain, U. Halici, I. Hayashi, S.B. Lee, and S.Tsutsui, Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press, 1999.
-
(1999)
Intelligent Biometric Techniques in Fingerprint and Face Recognition
-
-
Jain, L.C.1
Halici, U.2
Hayashi, I.3
Lee, S.B.4
Tsutsui, S.5
-
14
-
-
38049177961
-
Biometric digital signature key generation and cryptography communication based on fingerprint
-
Springer-Verlag
-
J. G. Jo, J. W. Seo, and H. W. Lee, "Biometric digital signature key generation and cryptography communication based on fingerprint," First Annual International Workshop 2007, LNCS 4613, pp. 38-49, Springer-Verlag, 2007.
-
(2007)
First Annual International Workshop 2007 LNCS
, vol.4613
, pp. 38-49
-
-
Jo, J.G.1
Seo, J.W.2
Lee, H.W.3
-
15
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to password security
-
Aug.
-
D. Klein, "Foiling the cracker: A survey of, and improvements to, password security," Proceedings of the 2nd USENIX Security Workshop, pp. 5-14, Aug. 1990.
-
(1990)
Proceedings of the 2nd USENIX Security Workshop,
, pp. 5-14
-
-
Klein, D.1
-
16
-
-
0026925546
-
Thinning methodologies-A comprehensive survey
-
Sep.
-
L. Lam, S. W. Lee, and C. Y. Suen, "Thinning methodologies-A comprehensive survey," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 14, no. 9, pp. 879, Sep. 1992.
-
(1992)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.14
, Issue.9
, pp. 879
-
-
Lam, L.1
Lee, S.W.2
Suen, C.Y.3
-
17
-
-
0004192381
-
-
CRC Press
-
A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, pp. 180, 1997.
-
(1997)
Handbook of Applied Cryptography
, pp. 180
-
-
Menezes, A.J.1
Oorschot, P.C.V.2
Vanstone, S.A.3
-
18
-
-
0018543411
-
Password security: A case history
-
Nov.
-
R. Morris, and K. Thompson, "Password security: A case history," Communications of the ACM, vol. 22, no. 11, pp. 594-597, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
20
-
-
0030736058
-
Direct gray-scale minu-tiae detection in fingerprints
-
D. Maio, and D. Maltoni, "Direct gray-scale minu-tiae detection in fingerprints,,"IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 1, pp. 27-40, 1997.
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.1
, pp. 27-40
-
-
Maio, D.1
Maltoni, D.2
-
21
-
-
67549140582
-
Cancellable biometrics for HMM-based signature recognition
-
E. Maiorana, P. Campisi, J. O. Garcia, and A. Neri, "Cancellable biometrics for HMM-based signature recognition," 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems, pp. 1-6, 2008.
-
(2008)
2nd IEEE International Conference on Biometrics: Theory, Applications and Systems
, pp. 1-6
-
-
Maiorana, E.1
Campisi, P.2
Garcia, J.O.3
Neri, A.4
-
22
-
-
35148885090
-
Cancellable biometrics realization with multispace random projections
-
A. B. Teoh, and C. T. Yuang, "Cancellable biometrics realization with multispace random projections," IEEE Transactions on Systems, vol. 37, no. 5, pp. 1096-106, 2007.
-
(2007)
IEEE Transactions on Systems
, vol.37
, Issue.5
, pp. 1096-106
-
-
Teoh, A.B.1
Yuang, C.T.2
-
24
-
-
0034829626
-
Cryptographic key generation from voice
-
F. Monrose, M. K. Reiter, L. Qi, and S. Wetzel, "Cryptographic key generation from voice," Proceedings of IEEE Symposium on Security and Privacy, pp. 202-213, 2001.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Qi, L.3
Wetzel, S.4
-
25
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proceedings of the IEEE, vol. 92, pp. 948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
27
-
-
34147129600
-
Cryptographic key generation from biometric data using lattice mapping
-
G. Zheng, W. Li, and C. Zhan, "Cryptographic key generation from biometric data using lattice mapping," Proceedings of the 18th International Conference on Pattern Recognition, vol. 4, pp. 513-516, 2006.
-
(2006)
Proceedings of the 18th International Conference on Pattern Recognition
, vol.4
, pp. 513-516
-
-
Zheng, G.1
Li, W.2
Zhan, C.3
|