메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Biometrics-based authentication: A new approach

Author keywords

authentication; Biometric Capsule; biometric template; biometrics; privacy; Reference Subject

Indexed keywords

APPLICATION REQUIREMENTS; AUTHENTICATION METHODS; AUTHENTICATION MODELS; AUTHENTICATION SOLUTIONS; BIOMETRIC INFORMATIONS; BIOMETRIC TEMPLATE; COMPUTING SYSTEM; CRITICAL PARTS; PRIVACY CONCERNS; REFERENCE SUBJECT; SECURITY AND PRIVACY; SECURITY PROTOCOLS;

EID: 80053018562     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2011.6005767     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 1
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38:97-139, 2008.
    • (2008) SIAM Journal on Computing , vol.38 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 2
    • 77954556974 scopus 로고    scopus 로고
    • Scale invariant gabor descriptorbased noncooperative iris recognition
    • February 2010
    • Y. Du, C. Belcher, and Z. Zhou. Scale invariant gabor descriptorbased noncooperative iris recognition. EURASIP J. Adv. Signal Process, 2010:37:1-37:10, February 2010.
    • (2010) EURASIP J. Adv. Signal Process , vol.37
    • Du, Y.1    Belcher, C.2    Zhou, Z.3
  • 4
    • 80052999541 scopus 로고    scopus 로고
    • Biometric convolution using multiple biometrics
    • Google Patents
    • V. Govindaraju, V. Chavan, and S. Chikkerur. Biometric convolution using multiple biometrics. Google Patents, 2005.
    • (2005)
    • Govindaraju, V.1    Chavan, V.2    Chikkerur, S.3
  • 5
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • DOI 10.1109/TC.2006.138
    • F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Transactions on Computers, 55(9):1081-1088, 2006. (Pubitemid 44263808)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 8
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • DOI 10.1007/s10623-005-6343-z
    • A. Juels and M. Sudan. A fuzzy vault scheme. Designs, Codes and Cryptography, 38:237-257, 2006. (Pubitemid 43102559)
    • (2006) Designs, Codes, and Cryptography , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 10
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Y. Lindell and B. Pinkas. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Advances in Cryptology - EUROCRYPT 2007, 4515:52-78, 2007.
    • (2007) Advances in Cryptology - EUROCRYPT 2007 , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 13
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM System Journal, 40:614-634, 2001. (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 18
    • 80053034474 scopus 로고    scopus 로고
    • Method, system and program for authenticating a user by biometric information
    • Google Patents
    • K. Takahashi, S. Hirata, H. Hino, and M. Mimura. Method, system and program for authenticating a user by biometric information. Google Patents, 2007.
    • (2007)
    • Takahashi, K.1    Hirata, S.2    Hino, H.3    Mimura, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.