-
1
-
-
0029405656
-
Generalized privacy amplification
-
Charles H. Bennett, Gilles Brassard, Claude Crépeau, and Ueli M. Maurer. Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6):1915-1923, 1995.
-
(1995)
IEEE Transactions on Information Theory
, vol.41
, Issue.6
, pp. 1915-1923
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Maurer, U.M.4
-
2
-
-
27844534088
-
A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition
-
Kevin W. Bowyer, Kyong Chang, and Patrick J. Flynn. A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition. Computer Vision and Image Understanding, 101(1):1-15, 2006.
-
(2006)
Computer Vision and Image Understanding
, vol.101
, Issue.1
, pp. 1-15
-
-
Bowyer, K.W.1
Chang, K.2
Flynn, P.J.3
-
3
-
-
85027496257
-
Secret key reconciliation by public discussion
-
volume 765 of Lecture Notes in Computer Science. Springer-Verlag
-
G. Brassard and L. Salvail. Secret Key Reconciliation by Public Discussion. In Advances in Cryptology-EUROCRYPT 1994, volume 765 of Lecture Notes in Computer Science, pages 410-423. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-EUROCRYPT 1994
, pp. 410-423
-
-
Brassard, G.1
Salvail, L.2
-
5
-
-
8844220225
-
Face recognition using 2D and 3D facial data
-
K. Chang, K. Bowyer, and P. Flynn. Face Recognition Using 2D and 3D Facial Data. In IEEE International Workshop on Analysis and Modeling of Faces and Gestures, Nice, France., 2003.
-
(2003)
IEEE International Workshop on Analysis and Modeling of Faces and Gestures, Nice, France
-
-
Chang, K.1
Bowyer, K.2
Flynn, P.3
-
6
-
-
35048865463
-
Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data
-
C. Cachin and J. Camenisch, editors, volume 3027 of Lecture Notes in Computer Science. Springer-Verlag
-
Y. Dodis, M. Reyzin, and A. Smith. Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch, editors, Advances in Cryptology-Eurocrypt 2004, volume 3027 of Lecture Notes in Computer Science, pages 523-540. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology-Eurocrypt 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, M.2
Smith, A.3
-
7
-
-
84873935448
-
-
Website of the European Union. See http://europa.eu/index-en.htm.
-
-
-
-
8
-
-
84873887865
-
-
Website of the 3D Face project. See http://www.3dface.org/home.
-
-
-
-
9
-
-
84873934397
-
-
Face Recognition Grand Challenge (FRGC). See http://www.frvt.org/FRGC/.
-
-
-
-
12
-
-
84873906064
-
-
Website International Civil Aviation Organisation. See http://www.icao.int/.
-
-
-
-
13
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth and E. Teletar, editors. IEEE Press, Lausanne, Switzerland
-
A. Juels andM. Sudan. AFuzzy Vault Scheme. In A. Lapidoth and E. Teletar, editors, In: Proceedings of IEEE Internation Symposium on Information Theory, page 408. IEEE Press, Lausanne, Switzerland, 2002.
-
(2002)
Proceedings of IEEE Internation Symposium on Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
15
-
-
84873903411
-
Robust and Secure Biometric-Some application examples
-
Vieweg
-
Tom A. M. Kevenaar, Geert Jan Schrijen, Anton H. M. Akkermans, Marijn Damstra, Pim Tuyls, andMichiel van der Veen. Robust and Secure Biometric-Some application examples. In Proceedings of the Information Security Solution Europe conference, pages 196-203. Vieweg, 2006.
-
(2006)
Proceedings of the Information Security Solution Europe Conference
, pp. 196-203
-
-
Kevenaar, T.A.M.1
Schrijen, G.J.2
Akkermans, A.H.M.3
Damstra, M.4
Tuyls, P.5
Veen Der M.Van6
-
16
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
IEEE Computer Society
-
Tom A. M. Kevenaar, Geert Jan Schrijen, Michiel van der Veen, Anton H. M. Akkermans, and Fei Zuo. Face Recognition with Renewable and Privacy Preserving Binary Templates. In IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), pages 21-26. IEEE Computer Society, 2005.
-
(2005)
IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005)
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.J.2
Veen Der M.Van3
Akkermans, A.H.M.4
Zuo, F.5
-
17
-
-
8844225798
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J. Kittler and M. Nixon, editors, volume 2688 of Lecture Notes in Computer Science,. Springer-Verlag
-
Jean-Paul M. G. Linnartz and Pim Tuyls. New Shielding Functions to enhance Privacy and Prevent Misuse of Biometric Templates. In J. Kittler and M. Nixon, editors, Conference on Audio and Video Based Person Authentication, volume 2688 of Lecture Notes in Computer Science, pages 238-250. Springer-Verlag, 2003.
-
(2003)
Conference on Audio and Video Based Person Authentication
, pp. 238-250
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
18
-
-
0033097504
-
Unconditional secure key agreement and the intrinsic conditional information
-
U. Maurer and S. Wolf. Unconditional Secure Key Agreement and the Intrinsic Conditional Information. IEEE Transactions on Information Theory, 45:499-514, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, pp. 499-514
-
-
Maurer, U.1
Wolf, S.2
-
20
-
-
0141676424
-
Automatic 3D face verification from range data
-
00938924.pdf
-
Gang Pan and Zhaohui Wu. Automatic 3D face verification from range data. In ICASSP, pages pp. 193-196, 2003. 00938924.pdf.
-
(2003)
ICASSP
, pp. 193-196
-
-
Pan, G.1
Wu, Z.2
-
21
-
-
0141857614
-
3D face recognition by profile and surface matching
-
Portland, Oregon. 01223744.pdf
-
Gang Pan, Yijun Wu, Zhaohui Wu, and Wenyao Liu. 3D Face Recognition by Profile and Surface Matching. In Proc. International Joint Conference on Neural Networks, pages 2168-2174, Portland, Oregon, 2003. 01223744.pdf.
-
(2003)
Proc. International Joint Conference on Neural Networks
, pp. 2168-2174
-
-
Pan, G.1
Wu, Y.2
Wu, Z.3
Liu, W.4
-
22
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
23
-
-
33947530278
-
Generating cancelable fingerprint templates
-
IBM Res., Hawthorne, NY;, April
-
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and RuudM. Bolle. Generating Cancelable Fingerprint Templates. In Pattern Analysis and Machine Intelligence, IEEE Transactions, volume Volume: 29, Issue: 4. IBM Res., Hawthorne, NY;, April 2007.
-
(2007)
Pattern Analysis and Machine Intelligence, IEEE Transactions
, vol.29
, Issue.4
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
24
-
-
33845435077
-
Capacity and examples of template protecting biometric authentication systems
-
D. Maltoni and A.K. Jain, editors, volume 3087 of Lecture Notes in Computer Science. Springer-Verlag
-
P. Tuyls and J. Goseling. Capacity and Examples of Template Protecting Biometric Authentication Systems. In D. Maltoni and A.K. Jain, editors, Biometric Authentication Workshop, volume 3087 of Lecture Notes in Computer Science, pages 158-170. Springer-Verlag, 2004.
-
(2004)
Biometric Authentication Workshop
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
25
-
-
84873913431
-
Private person authentication in an ambient world
-
Milan Petkovic and Willem Jonker, editors, Data-Centric Systems and Applications. Springer
-
Pim Tuyls and Tom Kevenaar. Private Person Authentication in an Ambient World. In Milan Petkovic and Willem Jonker, editors, Security, Privacy and Trust in Modern Data Management, Data-Centric Systems and Applications. Springer, 2007.
-
(2007)
Security, Privacy and Trust in Modern Data Management
-
-
Tuyls, P.1
Kevenaar, T.2
|