메뉴 건너뛰기




Volumn 6879 LNCS, Issue , 2011, Pages 190-209

Secure and efficient protocols for iris and fingerprint identification

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; PALMPRINT RECOGNITION;

EID: 80053027350     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23822-2_11     Document Type: Conference Paper
Times cited : (146)

References (39)
  • 2
    • 70349858081 scopus 로고    scopus 로고
    • Secure biometric authentication with improved accuracy
    • Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
    • Barbosa, M., Brouard, T., Cauchie, S., de Sousa, S.M.: Secure biometric authentication with improved accuracy. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 21-36. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5107 , pp. 21-36
    • Barbosa, M.1    Brouard, T.2    Cauchie, S.3    De Sousa, S.M.4
  • 4
    • 67749135560 scopus 로고    scopus 로고
    • A new user dependent iris recognition system based on an area preserving pointwise level set segmentation approach
    • Barzegar, N., Moin, M.: A new user dependent iris recognition system based on an area preserving pointwise level set segmentation approach. EURASIP Journal on Advances in Signal Processing, 1-13 (2009)
    • (2009) EURASIP Journal on Advances in Signal Processing , pp. 1-13
    • Barzegar, N.1    Moin, M.2
  • 6
    • 76549136227 scopus 로고    scopus 로고
    • Technical Report 2009-03, Department of Computer Science and Engineering, University of Notre Dame
    • Blanton, M., Aliasgari, M.: Secure computation of biometric matching. Technical Report 2009-03, Department of Computer Science and Engineering, University of Notre Dame (2009)
    • (2009) Secure Computation of Biometric Matching
    • Blanton, M.1    Aliasgari, M.2
  • 8
    • 38149070898 scopus 로고    scopus 로고
    • An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
    • Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. Springer, Heidelberg
    • Bringer, J., Chabanne, H., Izabachène, M., Pointcheval, D., Tang, Q., Zimmer, S.: An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96-106. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4586 , pp. 96-106
    • Bringer, J.1    Chabanne, H.2    Izabachène, M.3    Pointcheval, D.4    Tang, Q.5    Zimmer, S.6
  • 10
    • 77955328311 scopus 로고    scopus 로고
    • Secure computation with fixed-point numbers
    • Sion, R. (ed.) FC 2010. Springer, Heidelberg
    • Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35-50. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6052 , pp. 35-50
    • Catrina, O.1    Saxena, A.2
  • 11
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Cramer, R., Damgård, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgård, I.B.2    Nielsen, J.B.3
  • 14
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous multiparty computation: Theory and implementation
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: Theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 160-179
    • Damgård, I.1    Geisler, M.2    Krøigaard, M.3    Nielsen, J.B.4
  • 16
    • 69949163699 scopus 로고    scopus 로고
    • Privacy-preserving face recognition
    • Goldberg, I., Atallah, M.J. (eds.) PETS 2009. Springer, Heidelberg
    • Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235-253. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5672 , pp. 235-253
    • Erkin, Z.1    Franz, M.2    Guajardo, J.3    Katzenbeisser, S.4    Lagendijk, I.5    Toft, T.6
  • 17
    • 38049089776 scopus 로고    scopus 로고
    • Privacy-preserving set union
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Frikken, K.B.: Privacy-preserving set union. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 237-252. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 237-252
    • Frikken, K.B.1
  • 21
    • 85165845290 scopus 로고    scopus 로고
    • U.S. DHS US-VISIT
    • U.S. DHS US-VISIT, http://www.dhs.gov/files/programs/usv.shtm
  • 22
    • 85165847242 scopus 로고    scopus 로고
    • Multiprecision Integer and Rational Arithmetic C/C++ Library
    • Multiprecision Integer and Rational Arithmetic C/C++ Library, http://www.shamus.ie/
  • 24
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 26
    • 71549170830 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 27
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 28
    • 52149120767 scopus 로고    scopus 로고
    • Implementing two-party computation efficiently with security against malicious adversaries
    • Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. Springer, Heidelberg
    • Lindell, Y., Pinkas, B., Smart, N.P.: Implementing two-party computation efficiently with security against malicious adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5229 , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 29
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 34
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 35
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 36
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: ACM Symposium on Theory of Computing (STOC), pp. 73-85 (1989)
    • (1989) ACM Symposium on Theory of Computing (STOC) , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 37
    • 77954610725 scopus 로고    scopus 로고
    • Efficient privacy-preserving face recognition
    • Lee, D., Hong, S. (eds.) ICISC 2009. Springer, Heidelberg
    • Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229-244. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5984 , pp. 229-244
    • Sadeghi, A.-R.1    Schneider, T.2    Wehrenberg, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.