-
4
-
-
84922512713
-
The practical subtleties of biometric key generation
-
L. Ballard, S. Kamara, and M. K. Reiter. The practical subtleties of biometric key generation. In USENIX Security '08, pages 61-74, 2008.
-
(2008)
USENIX Security '08
, pp. 61-74
-
-
Ballard, L.1
Kamara, S.2
Reiter, M.K.3
-
5
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
IEEE, june
-
T. Boult, W. Schdrer, and R. Woodworth. Revocable fingerprint biotokens: Accuracy and security analysis. In CVPR '07, pages 1-8. IEEE, june 2007.
-
(2007)
CVPR '07
, pp. 1-8
-
-
Boult, T.1
Schdrer, W.2
Woodworth, R.3
-
6
-
-
38349176849
-
Extended private information retrieval and its application in biometrics authentications
-
volume 4856 of LNCS, Springer
-
J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang. Extended private information retrieval and its application in biometrics authentications. In CANS 2007, volume 4856 of LNCS, pages 175-193. Springer, 2007.
-
(2007)
CANS 2007
, pp. 175-193
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Tang, Q.4
-
7
-
-
58049132058
-
An application of the Boneh and Shacham group signature scheme to biometric authentication
-
volume 5312 of LNCS. Springer
-
J. Bringer, H. Chabanne, D. Pointcheval, and S. Zimmer. An application of the Boneh and Shacham group signature scheme to biometric authentication. In IWSEC 2008, volume 5312 of LNCS. Springer, 2008.
-
(2008)
IWSEC 2008
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Zimmer, S.4
-
8
-
-
84866778390
-
A quantitative analysis of cross-matching resilience for a continuous-domain biometric encryption technique
-
I. Buhan, J. Breebaart, J. Guajardo, K. de Groot, E. Kelkboom, and T. Akkermans. A quantitative analysis of cross-matching resilience for a continuous-domain biometric encryption technique. In SPEED 2009, 2009.
-
(2009)
SPEED 2009
-
-
Buhan, I.1
Breebaart, J.2
Guajardo, J.3
De Groot, K.4
Kelkboom, E.5
Akkermans, T.6
-
9
-
-
77953081212
-
Embedding renewable cryptographic keys into noisy data
-
I. Buhan, J. Doumen, P. Hartel, Q. Tang, and R. Veldhuis. Embedding renewable cryptographic keys into noisy data. Int. J. Information Security, 9:193-208, 2010.
-
(2010)
Int. J. Information Security
, vol.9
, pp. 193-208
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Tang, Q.4
Veldhuis, R.5
-
10
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
ACM
-
I. Buhan, J. Doumen, P. H. Hartel, and R. N. J. Veldhuis. Fuzzy extractors for continuous distributions. In ASIACCS '07, pages 353-355. ACM, 2007.
-
(2007)
ASIACCS '07
, pp. 353-355
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
13
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In EUROCRYPT 2004, pages 523-540. Springer, 2004.
-
(2004)
EUROCRYPT 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
14
-
-
84866781836
-
System portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
-
GenKey, US Patent 2006/0198514A1
-
GenKey. System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys - US Patent 2006/0198514A1, 2006.
-
(2006)
-
-
-
17
-
-
0036350106
-
A fuzzy vault scheme
-
IEEE
-
A. Juels and M. Sudan. A fuzzy vault scheme. In ISIT 2002, page 408. IEEE, 2002.
-
(2002)
ISIT 2002
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
18
-
-
0033281339
-
A fuzzy commitment scheme
-
ACM
-
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In CCS '99, pages 28-36. ACM, 1999.
-
(1999)
CCS '99
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
19
-
-
79951844995
-
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
-
march
-
E. Kelkboom, J. Breebaart, T. Kevenaar, I. Buhan, and R. Veldhuis. Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Tr. on Inf. For. and Sec., 6(1):107-121, march 2011.
-
(2011)
IEEE Tr. on Inf. For. and Sec.
, vol.6
, Issue.1
, pp. 107-121
-
-
Kelkboom, E.1
Breebaart, J.2
Kevenaar, T.3
Buhan, I.4
Veldhuis, R.5
-
20
-
-
77649250983
-
Secure sketch for biometric templates
-
volume 4284 of LNCS, Springer
-
Q. Li, Y. Sutcu, and N. Memon. Secure sketch for biometric templates. In ASIACRYPT 2006, volume 4284 of LNCS, pages 99-113. Springer, 2006.
-
(2006)
ASIACRYPT 2006
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
21
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
volume 2688 of LNCS, Springer
-
J.-P. M. G. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA 2003, volume 2688 of LNCS, pages 393-402. Springer, 2003.
-
(2003)
AVBPA 2003
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
22
-
-
77949786186
-
On the security of non-invertible fingerprint template transforms
-
IEEE
-
A. Nagar and A. Jain. On the security of non-invertible fingerprint template transforms. In WIFS 2009, pages 81-85. IEEE, 2009.
-
(2009)
WIFS 2009
, pp. 81-85
-
-
Nagar, A.1
Jain, A.2
-
23
-
-
77951799602
-
Biometric template transformation: A security analysis
-
A. Nagar, K. Nandakumar, and A. K. Jain. Biometric template transformation: a security analysis. In SPIE 7541, 2010.
-
(2010)
SPIE
, vol.7541
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
24
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
K. Nandakumar, A. Jain, and S. Pankanti. Fingerprint-based fuzzy vault: Implementation and performance. IEEE Tr. on Inf. For. and Sec., 2(4):744-757, 2007.
-
(2007)
IEEE Tr. on Inf. For. and Sec.
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.2
Pankanti, S.3
-
25
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
S. Prabhakar, S. Pankanti, and A. K. Jain. Biometric recognition: Security and privacy concerns. IEEE Security and Privacy, 1(2):33-42, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
26
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell., 29(4):561-572, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
27
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems J., 40(3):614-634, 2001.
-
(2001)
IBM Systems J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
28
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics
-
2011
-
C. Rathgeb and A. Uhl. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. on Information Security, 2011(3), 2011.
-
(2011)
EURASIP J. on Information Security
, Issue.3
-
-
Rathgeb, C.1
Uhl, A.2
-
29
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
W. Scheirer and T. Boult. Cracking fuzzy vaults and biometric encryption. In Biometrics Symposium, pages 1-6, 2007.
-
(2007)
Biometrics Symposium
, pp. 1-6
-
-
Scheirer, W.1
Boult, T.2
-
30
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
IEEE
-
K. Simoens, P. Tuyls, and B. Preneel. Privacy weaknesses in biometric sketches. In S&P 2009, pages 188-203. IEEE, 2009.
-
(2009)
S&P 2009
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
32
-
-
0032224440
-
Biometric encryption using image processing
-
SPIE
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar. Biometric encryption using image processing. In Optical Security and Counterfeit Deterrence Techniques II, volume 3314, pages 178-188. SPIE, 1998.
-
(1998)
Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
33
-
-
33748076787
-
A secure biometric authentication scheme based on robust hashing
-
ACM
-
Y. Sutcu, H. T. Sencar, and N. Memon. A secure biometric authentication scheme based on robust hashing. In MM&Sec '05, pages 111-116. ACM, 2005.
-
(2005)
MM&Sec '05
, pp. 111-116
-
-
Sutcu, Y.1
Sencar, H.T.2
Memon, N.3
-
34
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
A. Teoh, A. Goh, and D. Ngo. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal.Mach. Intell., 28(12):1892-1901, 2006.
-
(2006)
IEEE Trans. Pattern Anal.Mach. Intell.
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Goh, A.2
Ngo, D.3
-
35
-
-
35148885090
-
Cancelable biometrics realization with multispace random projections
-
A. Teoh and C. T. Yuang. Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst., Man, Cybern. B, Cybern., 37(5):1096-1106, 2007.
-
(2007)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.1
Yuang, C.T.2
-
36
-
-
26444507172
-
Practical biometric authentication with template protection
-
Springer
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis. Practical biometric authentication with template protection. In AVBPA, volume 3546, pages 436-446. Springer, 2005.
-
(2005)
AVBPA
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
37
-
-
77951790032
-
Robust minutiae hash for fingerprint template protection
-
SPIE
-
B. Yang, C. Busch, P. Bours, and D. Gafurov. Robust minutiae hash for fingerprint template protection. In Media Forensics and Security, volume 7541. SPIE, 2010.
-
(2010)
Media Forensics and Security
, vol.7541
-
-
Yang, B.1
Busch, C.2
Bours, P.3
Gafurov, D.4
-
38
-
-
78650371034
-
Dynamic random projection for biometric template protection
-
IEEE
-
B. Yang, D. Hartung, K. Simoens, and C. Busch. Dynamic random projection for biometric template protection. In BTAS 2010, pages 1-7. IEEE, 2010.
-
(2010)
BTAS 2010
, pp. 1-7
-
-
Yang, B.1
Hartung, D.2
Simoens, K.3
Busch, C.4
|