-
1
-
-
71549143789
-
Biometric identification over encrypted data made feasible
-
M. Adjedj, J. Bringer, H. Chabanne, and B. Kindarji. Biometric identification over encrypted data made feasible. In ICISS, pages 86-100, 2009.
-
(2009)
ICISS
, pp. 86-100
-
-
Adjedj, M.1
Bringer, J.2
Chabanne, H.3
Kindarji, B.4
-
2
-
-
84866779632
-
Secure and efficient protocols for iris and fingerprint identification
-
M. Blanton and P. Gasti. Secure and efficient protocols for iris and fingerprint identification. In ESORICS, 2011.
-
(2011)
ESORICS
-
-
Blanton, M.1
Gasti, P.2
-
3
-
-
45449114377
-
An authentication protocol with encrypted biometric data
-
J. Bringer and H. Chabanne. An authentication protocol with encrypted biometric data. In AFRICACRYPT, pages 109-124, 2008.
-
(2008)
AFRICACRYPT
, pp. 109-124
-
-
Bringer, J.1
Chabanne, H.2
-
4
-
-
81855166982
-
Biometric identification paradigm: Towards privacy and confidentiality protection
-
E. R. Nichols, editor. Nova Science Publishers
-
J. Bringer and H. Chabanne. Biometric identification paradigm: Towards privacy and confidentiality protection. In E. R. Nichols, editor, Biometrics: Theory, Applications, and Issues. Nova Science Publishers, 2011.
-
(2011)
Biometrics: Theory, Applications, and Issues
-
-
Bringer, J.1
Chabanne, H.2
-
5
-
-
79955005687
-
Identification with encrypted biometric data
-
J. Bringer, H. Chabanne, and B. Kindarji. Identification with encrypted biometric data. Security and Communication Networks, 4(5):548-562, 2011.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.5
, pp. 548-562
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
6
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
J. Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. on Pattern Analysis and Machine Intelligence, 15(11), 1993.
-
(1993)
IEEE Trans. on Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
-
-
Daugman, J.1
-
7
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman. The importance of being random: statistical principles of iris recognition. Pattern Recognition, 36(2), 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
-
-
Daugman, J.1
-
9
-
-
77949825199
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In Privacy Enhancing Technologies, 2009.
-
(2009)
Privacy Enhancing Technologies
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
12
-
-
79958010869
-
Efficient secure two-party protocols: Techniques and constructions
-
Springer-Verlag
-
C. Hazay and Y. Lindell. Efficient Secure Two-Party Protocols: Techniques and Constructions. Information Security and Cryptography Series, Springer-Verlag, 2010.
-
(2010)
Information Security and Cryptography Series
-
-
Hazay, C.1
Lindell, Y.2
-
14
-
-
84923318201
-
Efficient privacypreserving biometric identification
-
Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacypreserving biometric identification. In NDSS, 2011.
-
(2011)
NDSS
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
15
-
-
84869443834
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, 2009.
-
(2009)
CANS
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
16
-
-
49049099825
-
Improved garbled circuit: Free xor gates and applications
-
V. Kolesnikov and T. Schneider. Improved garbled circuit: Free xor gates and applications. In ICALP (2), 2008.
-
(2008)
ICALP
, Issue.2
-
-
Kolesnikov, V.1
Schneider, T.2
-
17
-
-
64249101946
-
A proof of security of Yao's protocol for two-party computation
-
Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. J. Cryptology, 22(2), 2009.
-
(2009)
J. Cryptology
, vol.22
, pp. 2
-
-
Lindell, Y.1
Pinkas, B.2
-
18
-
-
79959312553
-
An oblivious transfer protocol with log-squared communication
-
H. Lipmaa. An oblivious transfer protocol with log-squared communication. In ISC, 2005.
-
(2005)
ISC
-
-
Lipmaa, H.1
-
20
-
-
22044454088
-
Computationally secure oblivious transfer
-
M. Naor and B. Pinkas. Computationally secure oblivious transfer. J. Cryptology, 18(1), 2005.
-
(2005)
J. Cryptology
, vol.18
, Issue.1
-
-
Naor, M.1
Pinkas, B.2
-
21
-
-
48649087855
-
-
National Institute of Standards and Technology (NIST). Iris Challenge Evaluation. http://iris.nist.gov/ICE, 2005.
-
(2005)
Iris Challenge Evaluation
-
-
-
22
-
-
84866782232
-
-
U. of Virginia and U. of Maryland
-
U. of Virginia and U. of Maryland. Might be evil. www.mightbeevil.com.
-
-
-
-
27
-
-
77952587150
-
Blind authentication: A secure crypto-biometric verification protocol
-
M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar. Blind authentication: a secure crypto-biometric verification protocol. IEEE Transactions on Information Forensics and Security, 5(2):255-268, 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 255-268
-
-
Upmanyu, M.1
Namboodiri, A.M.2
Srinathan, K.3
Jawahar, C.V.4
-
28
-
-
0031236835
-
Automated iris recognition: An emerging biometric technology
-
R. Wildes. Automated iris recognition: An emerging biometric technology. Proceedings of the IEEE, 85(9), 1997.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
-
-
Wildes, R.1
-
30
-
-
0003113271
-
How to generate and exchange secrets (extended abstract)
-
A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
|