-
1
-
-
71549143789
-
Biometric identification over encrypted data made feasible
-
In Atul Prakash and Indranil Gupta, editors, ICISS, volume 5905 of Lecture Notes in Computer Science, Springer
-
Michael Adjedj, Julien Bringer, Hervé Chabanne, and Bruno Kindarji. Biometric identification over encrypted data made feasible. In Atul Prakash and Indranil Gupta, editors, ICISS, volume 5905 of Lecture Notes in Computer Science, pages 86-100. Springer, 2009.
-
(2009)
, pp. 86-100
-
-
Adjedj, M.1
Bringer, J.2
Chabanne, H.3
Kindarji, B.4
-
2
-
-
37549058056
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
Alexandr Andoni and Indyk Piotr. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun. ACM, 51(1):117-122, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.1
, pp. 117-122
-
-
Andoni, A.1
Piotr, I.2
-
3
-
-
33751031560
-
New constructions and practical applications for private stream searching (extended abstract)
-
IEEE Computer Society
-
John Bethencourt, Dawn X. Song, and Brent Waters. New constructions and practical applications for private stream searching (extended abstract). In IEEE Symposium on Security and Privacy, pages 132-139. IEEE Computer Society, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 132-139
-
-
Bethencourt, J.1
Song, D.X.2
Waters, B.3
-
4
-
-
0014814325
-
Bloom. Space/time trade-offs in hash coding with allowable errors
-
Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Burton, H.1
-
5
-
-
17444370055
-
Public key encryption with keyword search
-
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In Cachin and Camenisch [16], pages 506-522.
-
Cachin and Camenisch
, vol.16
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
38049138213
-
Public key encryption that allows PIR queries
-
editor, CRYPTO, Springer
-
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, and William. E. Skeith III. Public key encryption that allows PIR queries. In Alfred Menezes, editor, CRYPTO, volume 4622, pages 50-67. Springer, 2007.
-
(2007)
Alfred Menezes
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith III, W.E.4
-
7
-
-
45449114377
-
An authentication protocol with encrypted biometric data
-
In Serge Vaudenay, editor, of Lecture Notes in Computer Science, Springer
-
Julien Bringer and Hervé Chabanne. An authentication protocol with encrypted biometric data. In Serge Vaudenay, editor, AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, pages 109-124. Springer, 2008.
-
(2008)
AFRICACRYPT
, vol.5023
, pp. 109-124
-
-
Bringer, J.1
Chabanne, H.2
-
8
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji, and Gilles Zémor. Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security, 3(4):673-683, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.D.3
Kindarji, B.4
Zémor, G.5
-
9
-
-
38149070898
-
An application of the goldwassermicali cryptosystem to biometric authentication
-
In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, of Lecture Notes in Computer Science, Springer
-
Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, and Sébastien Zimmer. An application of the goldwassermicali cryptosystem to biometric authentication. In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, ACISP, volume 4586 of Lecture Notes in Computer Science, pages 96-106. Springer, 2007.
-
(2007)
ACISP
, vol.4586
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachène, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
10
-
-
77952047954
-
Extending match-on-card to local biometric identification
-
In Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Fáundez-Zanuy, editors, of Lecture Notes in Computer Science, Springer
-
Julien Bringer, Hervé Chabanne, Tom A. M. Kevenaar, and Bruno Kindarji. Extending match-on-card to local biometric identification. In Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Fáundez-Zanuy, editors, COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, pages 178-186. Springer, 2009.
-
(2009)
COST 2101/2102 Conference
, vol.5707
, pp. 178-186
-
-
Bringer, J.1
Chabanne, H.2
Kevenaar, T.A.M.3
Kindarji, B.4
-
11
-
-
56349139535
-
The best of both worlds: Applying secure sketches to cancelable biometrics
-
Julien Bringer, Hervé Chabanne, and Bruno Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Sci. Comput. Program., 74(1-2):43-51, 2008.
-
(2008)
Sci. Comput. Program.
, vol.74
, Issue.1-2
, pp. 43-51
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
13
-
-
79955005687
-
Identification with encrypted biometric data. Security Comm
-
Networks, doi:10.1002/sec.206
-
Julien Bringer, Hervé Chabanne, and Bruno Kindarji. Identification with encrypted biometric data. Security Comm. Networks, 2010. doi:10.1002/sec.206.
-
(2010)
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
14
-
-
38349176849
-
Extended private information retrieval and its application in biometrics authentications
-
In Feng Bao, San Ling, Tatsuaki Okamoto, HuaxiongWang, and Chaoping Xing, editors, of Lecture Notes in Computer Science, Springer
-
Julien Bringer, Hervé Chabanne, David Pointcheval, and Qiang Tang. Extended private information retrieval and its application in biometrics authentications. In Feng Bao, San Ling, Tatsuaki Okamoto, HuaxiongWang, and Chaoping Xing, editors, CANS, volume 4856 of Lecture Notes in Computer Science, pages 175-193. Springer, 2007.
-
(2007)
CANS
, vol.4856
, pp. 175-193
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Tang, Q.4
-
15
-
-
58049132058
-
An application of the boneh and shacham group signature scheme to biometric authentication
-
In Kanta Matsuura and Eiichiro Fujisaki, editors, of Lecture Notes in Computer Science, Springer
-
Julien Bringer, Hervé Chabanne, David Pointcheval, and Sébastien Zimmer. An application of the boneh and shacham group signature scheme to biometric authentication. In Kanta Matsuura and Eiichiro Fujisaki, editors, IWSEC, volume 5312 of Lecture Notes in Computer Science, pages 219-230. Springer, 2008.
-
(2008)
IWSEC
, vol.5312
, pp. 219-230
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Zimmer, S.4
-
16
-
-
84889576817
-
Advances in Cryptology -EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques
-
Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume, of Lecture Notes in Computer Science. Springer
-
Christian Cachin and Jan Camenisch, editors. Advances in Cryptology -EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science. Springer, 2004.
-
(2004)
, vol.3027
-
-
Cachin, C.1
Camenisch, J.2
-
17
-
-
69949132178
-
Binary biometric representation through pairwise polar quantization
-
In Massimo Tistarelli and Mark S. Nixon, editors, of Lecture Notes in Computer Science, Springer
-
Chun Chen and Raymond N. J. Veldhuis. Binary biometric representation through pairwise polar quantization. In Massimo Tistarelli and Mark S. Nixon, editors, ICB, volume 5558 of Lecture Notes in Computer Science, pages 72-81. Springer, 2009.
-
(2009)
ICB
, vol.5558
, pp. 72-81
-
-
Chen, C.1
Veldhuis, R.N.J.2
-
18
-
-
34547240272
-
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
-
ACM
-
Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 79-88. ACM, 2006.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
19
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
John Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell., 15(11):1148-1161, 1993.
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
20
-
-
84892043078
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Cachin and Camenisch [16], pages 523-540.
-
Cachin and Camenisch
, vol.16
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
21
-
-
84892052411
-
Gasarch. A survey on private information retrieval
-
William I. Gasarch. A survey on private information retrieval. http://www.cs.umd.edu/ gasarch/pir/pir.html.
-
-
-
William, I.1
-
22
-
-
33244488406
-
Secure indexes
-
Cryptology ePrint Archive, Report 2003/216
-
Eu-Jin Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/2003/216/.
-
(2003)
-
-
Goh, E.-J.1
-
23
-
-
44049109285
-
A fast search algorithm for a large fuzzy database. Information Forensics and Security
-
June
-
Feng Hao, John Daugman, and Piotr Zielinski. A fast search algorithm for a large fuzzy database. Information Forensics and Security, IEEE Transactions on, 3(2):203-212, June 2008.
-
(2008)
IEEE Transactions on
, vol.3
, Issue.2
, pp. 203-212
-
-
Hao, F.1
Daugman, J.2
Zielinski, P.3
-
24
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
In Don Coppersmith, editor, of Lecture Notes in Computer Science, Springer
-
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret sharing or: How to cope with perpetual leakage. In Don Coppersmith, editor, CRYPTO, volume 963 of Lecture Notes in Computer Science, pages 339-352. Springer, 1995.
-
(1995)
CRYPTO
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
25
-
-
50649106124
-
Handbook of Biometrics
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
Anil K. Jain, Patrick Flynn, and Arun A. Ross. Handbook of Biometrics. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2007.
-
(2007)
-
-
Jain, A.K.1
Flynn, P.2
Ross, A.A.3
-
26
-
-
0013143822
-
Fingercode: A filterbank for fingerprint representation and matching
-
IEEE Computer Society
-
Anil K. Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. Fingercode: A filterbank for fingerprint representation and matching. In CVPR, pages 2187-. IEEE Computer Society, 1999.
-
(1999)
CVPR
, pp. 2187
-
-
Jain, A.K.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
30
-
-
78149275738
-
Encyclopedia of Biometrics
-
Springer US
-
Stan Z. Li and Anil K. Jain, editors. Encyclopedia of Biometrics. Springer US, 2009.
-
(2009)
-
-
Li, S.Z.1
Jain, A.K.2
-
31
-
-
0030714231
-
Private information storage (extended abstract)
-
Rafail Ostrovsky and Victor Shoup. Private information storage (extended abstract). In STOC, pages 294-303, 1997.
-
(1997)
STOC
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
32
-
-
24644489770
-
Nearest neighbors in high-dimensional spaces
-
In Jacob E. Goodman and Joseph O'Rourke, editors, chapter 39. CRC Press, 2rd edition
-
Indyk Piotr. Nearest neighbors in high-dimensional spaces. In Jacob E. Goodman and Joseph O'Rourke, editors, Handbook of Discrete and Computational Geometry, chapter 39. CRC Press, 2004. 2rd edition.
-
(2004)
Handbook of Discrete and Computational Geometry
-
-
Piotr, I.1
-
33
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
Indyk Piotr and Motwani Rajeev. Approximate nearest neighbors: Towards removing the curse of dimensionality. In Symposium on the Theory Of Computing, pages 604-613, 1998.
-
(1998)
Symposium on the Theory Of Computing
, pp. 604-613
-
-
Piotr, I.1
Rajeev, M.2
-
34
-
-
0018545449
-
How to share a secret
-
Adi Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
41549110945
-
A formal study of the privacy concerns in biometric-based remote authentication schemes
-
In Liqun Chen, Yi Mu, and Willy Susilo, editors, of Lecture Notes in Computer Science, Springer
-
Qiang Tang, Julien Bringer, Hervé Chabanne, and David Pointcheval. A formal study of the privacy concerns in biometric-based remote authentication schemes. In Liqun Chen, Yi Mu, and Willy Susilo, editors, ISPEC, volume 4991 of Lecture Notes in Computer Science, pages 56-70. Springer, 2008.
-
(2008)
ISPEC
, vol.4991
, pp. 56-70
-
-
Tang, Q.1
Bringer, J.2
Chabanne, H.3
Pointcheval, D.4
|