-
2
-
-
60349121964
-
-
ISO/IEC JTC 1 SC 37
-
ISO/IEC JTC 1 SC 37. Biometrics.
-
Biometrics
-
-
-
4
-
-
69949152723
-
An application of the Goldwasser-Micali cryptosystem to biometric authentication
-
J. Bringer, H. Chabanne, M. Izabachene, D. Pointcheval, Q. Tang, and S. Zimmer. An application of the Goldwasser-Micali cryptosystem to biometric authentication. In ACISP, 2007.
-
(2007)
ACISP
-
-
Bringer, J.1
Chabanne, H.2
Izabachene, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
5
-
-
69949176476
-
Extended private information retrieval and its application in biometrics authentications
-
J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang. Extended private information retrieval and its application in biometrics authentications. In CANS, 2007.
-
(2007)
CANS
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Tang, Q.4
-
6
-
-
79953680402
-
Match-on-card for secure and scalable biometric authentication
-
N. K. Ratha and V. Govindaraju, editors, Springer, London
-
C. Bergman. Match-on-card for secure and scalable biometric authentication. In N. K. Ratha and V. Govindaraju, editors, Advances in biometrics. Springer, London, 2008.
-
(2008)
Advances in Biometrics
-
-
Bergman, C.1
-
7
-
-
38149030200
-
Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy
-
A. Cavoukian and A. Stoianov. Biometric encryption: a positive-sum technology that achieves strong authentication, security and privacy. Whitepaper information and Privacy Commissioner/Ontario, 2007. available from www.ipc.on.ca.
-
(2007)
Whitepaper Information and Privacy Commissioner/Ontario
-
-
Cavoukian, A.1
Stoianov, A.2
-
8
-
-
54049089250
-
Pseudo idenitities based on fingerprint characteristics
-
Harbin, China
-
N. Delvaux, H. Chabanne, J. Bringer, B. Kindarji, P. Lindeberg, J. Midgren, J. Breebaart, T. Akkermans, M. van der Veen, R. Veldhuis, E. Kindt, K. Simoens, C. Busch, P. Bours, D. Gafurov, B. Yang, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos. Pseudo idenitities based on fingerprint characteristics. In IEEE 4th international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), Harbin, China, 2008.
-
(2008)
IEEE 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
-
-
Delvaux, N.1
Chabanne, H.2
Bringer, J.3
Kindarji, B.4
Lindeberg, P.5
Midgren, J.6
Breebaart, J.7
Akkermans, T.8
Veen Der M.Van9
Veldhuis, R.10
Kindt, E.11
Simoens, K.12
Busch, C.13
Bours, P.14
Gafurov, D.15
Yang, B.16
Stern, J.17
Rust, C.18
Cucinelli, B.19
Skepastianos, D.20
more..
-
9
-
-
56749111051
-
-
Mitsubishi Electric Research Labs
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. Yedidia. Using distributed source coding to secure fingerprint biometrics. In Mitsubishi Electric Research Labs, 2007.
-
(2007)
Using Distributed Source Coding to Secure Fingerprint Biometrics
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.5
-
10
-
-
17744381820
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocrypt, 2004.
-
(2004)
Eurocrypt
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
19
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Jean-Paul M. G. Linnartz and Pim Tuyls. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. In AVBPA, pages 393-402, 2003.
-
(2003)
AVBPA
, pp. 393-402
-
-
Jean-Paul, M.1
Linnartz, G.2
Tuyls, P.3
-
22
-
-
84873915261
-
-
ARTICLE 29 Data Protection Working Party. Last visited: May 24, 2008
-
ARTICLE 29 Data Protection Working Party. Working document on biometrics Working Document on Biometrics. http://ec.europa.eu/justicehome/fsj/privacy/ docs/wpdocs/2003/wp80-en.pdf, 2003. Last visited: May 24, 2008.
-
(2003)
Working Document on Biometrics Working Document on Biometrics
-
-
-
23
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Trans. pattern analysis and machine intelligence, 29(4):561-572, 2007.
-
(2007)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
24
-
-
0032224440
-
Biometric Encryption using image processing
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar. Biometric Encryption using image processing. In Proc. SPIE 3314, pages 178-188, 1998.
-
(1998)
Proc. SPIE
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
25
-
-
84873915360
-
Efficient binary conversion for Paillier encrypted values
-
B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. In Eurocrypt, 2006.
-
(2006)
Eurocrypt
-
-
Schoenmakers, B.1
Tuyls, P.2
-
26
-
-
26444507172
-
Practical biometric authentication with template protection
-
Springer, Berlin, Germany
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis. Practical biometric authentication with template protection. In Audio and video-based biometric person authentication, pages 436-446. Springer, Berlin, Germany, 2005.
-
(2005)
Audio and Video-based Biometric Person Authentication
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
27
-
-
84873934330
-
-
ANSI/INCITS technical committee M1
-
ANSI/INCITS technical committee M1. Biometrics. http://m1.incits.org/.
-
Biometrics
-
-
-
28
-
-
84873900992
-
-
Identity theft website. http://www.idtheft.com.
-
-
-
|