-
1
-
-
38049006519
-
Fuzzy extractors for minutiae-based fingerprint authentication
-
S.W. Lee, S.Z. Li, Lecture Notes in Computer Science Springer New York, NY
-
A. Arakala, J. Jeffers, and K.J. Horadam Fuzzy extractors for minutiae-based fingerprint authentication S.W. Lee, S.Z. Li, Proceedings of Advances in Biometrics Lecture Notes in Computer Science vol. 4642 2007 Springer New York, NY 760 769
-
(2007)
Proceedings of Advances in Biometrics
, vol.4642
, pp. 760-769
-
-
Arakala, A.1
Jeffers, J.2
Horadam, K.J.3
-
2
-
-
85013430736
-
-
BIT
-
BIT, Biometric Ideal Test, < http://biometrics.idealtest.org/ findTotalDbByMode.do?mode=Iris >.
-
Biometric Ideal Test
-
-
-
3
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
X. Boyen Reusable cryptographic fuzzy extractors Proceedings of the 11th ACM Conference on Computer and Communications Security 2004 ACM New York, NY 82 91 (Pubitemid 40338192)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 82-91
-
-
Boyen, X.1
-
4
-
-
24944501364
-
Secure remote authentication using biometric data
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith Secure remote authentication using biometric data R. Cramer, Proceedings of Advances in Cryptology Lecture Notes in Computer Science vol. 3494 2005 Springer New York, NY 147 163 (Pubitemid 41313951)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
5
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
ACM New York, NY
-
I.R. Buhan, J.M. Doumen, P.H. Hartel, and R.N.J. Veldhuis Fuzzy extractors for continuous distributions Proceedings of ACM Symposium on Information, Computer and Communications Security 2007 ACM New York, NY 353 355
-
(2007)
Proceedings of ACM Symposium on Information, Computer and Communications Security
, pp. 353-355
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
6
-
-
72849123651
-
Secure ad-hoc pairing with biometrics: SAfE
-
I.R. Buhan, J.M. Doumen, P.H. Hartel, R.N.J. Veldhuis, Secure ad-hoc pairing with biometrics: SAfE, in: Proc. First Int. Workshop Security for Spontaneous Interaction, 2007, pp. 450-456.
-
(2007)
Proc. First Int. Workshop Security for Spontaneous Interaction
, pp. 450-456
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
7
-
-
11244340682
-
Biometric-based cryptographic key generation
-
Y. Chang, W. Zhang, T. Chen, Biometric-based cryptographic key generation, In: Proc. IEEE Conf. Multimedia and Expo, 2004, pp. 2203-2206.
-
(2004)
Proc. IEEE Conf. Multimedia and Expo
, pp. 2203-2206
-
-
Chang, Y.1
Zhang, W.2
Chen, T.3
-
8
-
-
79551502714
-
New receipt-free voting scheme using double-trapdoor commitment
-
X. Chen, Q. Wub, F. Zhang, H. Tian, B. Wei, B. Lee, H. Lee, and K. Kim New receipt-free voting scheme using double-trapdoor commitment Information Sciences 181 2011 1493 1502
-
(2011)
Information Sciences
, vol.181
, pp. 1493-1502
-
-
Chen, X.1
Wub, Q.2
Zhang, F.3
Tian, H.4
Wei, B.5
Lee, B.6
Lee, H.7
Kim, K.8
-
9
-
-
84857845987
-
-
doi:10.1016/j.ins.2010.02.026 in press, available online 6 March
-
J.F. Connolly, E. Granger, R. Sabourin, An adaptive classification system for video-based face recognition, Information Sciences, in press, available online 6 March 2010, doi:10.1016/j.ins.2010.02.026.
-
(2010)
An Adaptive Classification System for Video-based Face Recognition, Information Sciences
-
-
Connolly, J.F.1
Granger, E.2
Sabourin, R.3
-
10
-
-
84858440981
-
Sistema criptobiométrico basado en iris para esquemas Diffie-Hellman con curva elíptica (ECDH)
-
E. Díez Laiz, C. Sánchez Ávila, Sistema criptobiométrico basado en iris para esquemas Diffie-Hellman con curva elíptica (ECDH), in: Proc. Congreso de Métodos Numéricos en Ingeniería, 2009.
-
(2009)
Proc. Congreso de Métodos Numéricos en Ingeniería
-
-
Díez Laiz, E.1
-
12
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM Journal Computing 38 1 2008 97 139
-
(2008)
SIAM Journal Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
78449313002
-
Provably secure identity-based authenticated key agreement protocols with malicious private key generators
-
H. Guo, Z. Li, Y. Muc, and X. Zhang Provably secure identity-based authenticated key agreement protocols with malicious private key generators Information Sciences 181 2011 628 647
-
(2011)
Information Sciences
, vol.181
, pp. 628-647
-
-
Guo, H.1
Li, Z.2
Muc, Y.3
Zhang, X.4
-
14
-
-
64549088954
-
Type-1 and type-2 fuzzy inference systems as integration methods in modular neural networks for multimodal biometry and its optimization with genetic algorithms
-
D. Hidalgo, O. Castillo, and P. Melin Type-1 and type-2 fuzzy inference systems as integration methods in modular neural networks for multimodal biometry and its optimization with genetic algorithms Information Sciences 179 2009 2123 2145
-
(2009)
Information Sciences
, vol.179
, pp. 2123-2145
-
-
Hidalgo, D.1
Castillo, O.2
Melin, P.3
-
15
-
-
84886049786
-
Security efficiency analysis of a biometric fuzzy extractor for iris templates
-
A. Herrero, P. Gastaldo, R. Zunino, E. Corchado (Eds.) Springer, New York, NY, Advances in Intelligent and Soft Computing
-
F. Hernández Álvarez, L. Hernández Encinas, Security efficiency analysis of a biometric fuzzy extractor for iris templates, in: A. Herrero, P. Gastaldo, R. Zunino, E. Corchado (Eds.), Proc. 2nd Int. Workshop Computational Intelligence in Security for Information Systems, Springer, New York, NY, Advances in Intelligent and Soft Computing 63, 2009, pp. 163-170.
-
(2009)
Proc. 2nd Int. Workshop Computational Intelligence in Security for Information Systems
, vol.63
, pp. 163-170
-
-
Hernández Álvarez, F.1
-
16
-
-
70350576593
-
Tongue shape classification by geometric features
-
B. Huang, J. Wu, D. Zhang, and N. Li Tongue shape classification by geometric features Information Sciences 180 2010 312 324
-
(2010)
Information Sciences
, vol.180
, pp. 312-324
-
-
Huang, B.1
Wu, J.2
Zhang, D.3
Li, N.4
-
19
-
-
0035164290
-
Fingerprint matching using minutiae and texture features
-
A.K. Jain, A. Ross, S. Prabhakar, Fingerprint matching using minutiae and texture features, in: Proc. Int. Conf. Image Processing, 2001, pp. 282-285. (Pubitemid 33057974)
-
(2001)
IEEE International Conference on Image Processing
, vol.3
, pp. 282-285
-
-
Jain, A.1
Ross, A.2
Prabhakar, S.3
-
22
-
-
77950031110
-
Time-selective convertible undeniable signatures with short conversion receipts
-
F. Laguillaumie, and D. Vergnaud Time-selective convertible undeniable signatures with short conversion receipts Information Sciences 180 2010 2458 2475
-
(2010)
Information Sciences
, vol.180
, pp. 2458-2475
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
23
-
-
77958593747
-
Activity-oriented access control to ubiquitous hospital information and services
-
X.H. Le, S. Lee, Y.K. Lee, H. Lee, M. Khalid, and R. Sankar Activity-oriented access control to ubiquitous hospital information and services Information Sciences 180 2010 2979 2990
-
(2010)
Information Sciences
, vol.180
, pp. 2979-2990
-
-
Le, X.H.1
Lee, S.2
Lee, Y.K.3
Lee, H.4
Khalid, M.5
Sankar, R.6
-
24
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
S.W. Lee, S.Z. Li, Lecture Notes in Computer Science Springer New York, NY
-
Y.J. Lee, K. Bae, S.J. Lee, K.R. Park, and J. Kim Biometric key binding: fuzzy vault based on iris images S.W. Lee, S.Z. Li, Proceedings of Advances in Biometrics Lecture Notes in Computer Science vol. 4642 2007 Springer New York, NY 800 808
-
(2007)
Proceedings of Advances in Biometrics
, vol.4642
, pp. 800-808
-
-
Lee, Y.J.1
Bae, K.2
Lee, S.J.3
Park, K.R.4
Kim, J.5
-
25
-
-
71149116162
-
Signcryption from randomness recoverable public key encryption
-
C.K. Li, and D.S. Wong Signcryption from randomness recoverable public key encryption Information Sciences 180 2010 549 559
-
(2010)
Information Sciences
, vol.180
, pp. 549-559
-
-
Li, C.K.1
Wong, D.S.2
-
26
-
-
77958152470
-
Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
-
H. Li, J. Zhang, and Z. Zhang Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes Information Sciences 180 2010 3876 3893
-
(2010)
Information Sciences
, vol.180
, pp. 3876-3893
-
-
Li, H.1
Zhang, J.2
Zhang, Z.3
-
29
-
-
84858444245
-
-
National Institute of Standards and Technology, Advanced Encryption Standard (AES), Federal Information Processing Standard Publication 197, 2001
-
National Institute of Standards and Technology, Advanced Encryption Standard (AES), Federal Information Processing Standard Publication 197, 2001.
-
-
-
-
31
-
-
84858445730
-
-
National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standard Publication 186-3, 2009
-
National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standard Publication 186-3, 2009.
-
-
-
-
32
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N.K. Ratha, J.H. Connell, and R.M. Bolle Enhancing security and privacy in biometrics-based authentication systems IBM Systems Journal 40 2001 614 634 (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
33
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R.L. Rivest, A. Shamir, and L.M. Adleman A method for obtaining digital signatures and public-key cryptosystems Communication of ACM 21 2 1978 120 126 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
34
-
-
6444240127
-
Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation
-
C. Sánchez Ávila, and R. Sánchez-Reillo Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation Pattern Recognition 38 2 2005 231 240
-
(2005)
Pattern Recognition
, vol.38
, Issue.2
, pp. 231-240
-
-
Sánchez Ávila, C.1
Sánchez-Reillo, R.2
-
38
-
-
37849038363
-
Biometric fuzzy extractors made practical: A proposal based on FingerCodes
-
S.W. Lee, S.Z. Li, Lecture Notes in Computer Science Springer New York, NY
-
V.V. Triem Tong, H. Sibert, J. Lecoeur, and M. Girault Biometric fuzzy extractors made practical: a proposal based on FingerCodes S.W. Lee, S.Z. Li, Proceedings of Advances in Biometrics Lecture Notes in Computer Science vol. 4642 2007 Springer New York, NY 604 613
-
(2007)
Proceedings of Advances in Biometrics
, vol.4642
, pp. 604-613
-
-
Triem Tong, V.V.1
Sibert, H.2
Lecoeur, J.3
Girault, M.4
-
39
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain Biometric cryptosystems: issues and challenges Proceedings of the IEEE 92 6 2004 948 960
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
40
-
-
78449305489
-
Forward-secure identity-based signature: Security notions and construction
-
J. Yu, R. Hao, F. Kong, X. Cheng, J. Fan, and Y. Chen Forward-secure identity-based signature: security notions and construction Information Sciences 181 2011 648 660
-
(2011)
Information Sciences
, vol.181
, pp. 648-660
-
-
Yu, J.1
Hao, R.2
Kong, F.3
Cheng, X.4
Fan, J.5
Chen, Y.6
-
41
-
-
77956612141
-
Certificateless threshold signature scheme from bilinear maps
-
H. Yuan, F. Zhang, X. Huang, Y. Mud, W. Susilo, and L. Zhang Certificateless threshold signature scheme from bilinear maps Information Sciences 180 2010 4714 4728
-
(2010)
Information Sciences
, vol.180
, pp. 4714-4728
-
-
Yuan, H.1
Zhang, F.2
Huang, X.3
Mud, Y.4
Susilo, W.5
Zhang, L.6
-
42
-
-
35649009040
-
Template protection and its implementation in 3D face recognition systems
-
X. Zhou, Template protection and its implementation in 3D face recognition systems, in: Proc. SPIE Conf. Biometric Technology for Human Identification IV, 2007, pp. 214-225.
-
(2007)
Proc. SPIE Conf. Biometric Technology for Human Identification
, vol.4
, pp. 214-225
-
-
Zhou, X.1
|