-
1
-
-
41549110945
-
A formal study of the privacy concerns in biometric-based remote authentication schemes
-
April 21-23, 2008
-
Tang Q, Bringer J, Chabanne H, and Pointcheval D, "A formal study of the privacy concerns in biometric-based remote authentication schemes," in Proc. of 4th Int. Conf. on Information Security Practice and Experience, vol. 4991, pp. 56-70, April 21-23, 2008.
-
Proc. of 4th Int. Conf. On Information Security Practice and Experience
, vol.4991
, pp. 56-70
-
-
Tang, Q.1
Bringer, J.2
Chabanne, H.3
Pointcheval, D.4
-
2
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Uludag U, "Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
-
3
-
-
35048835319
-
Secure identity based encryption without random oracles
-
August 15-19, 2004
-
Boneh D, and Boyen X, "Secure identity based encryption without random oracles," in Proc. Of 24th Annual Int. Cryptology Conf., vol. 3152, pp. 443-459, August 15-19, 2004.
-
Proc. of 24th Annual Int. Cryptology Conf
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
4
-
-
24944554962
-
Fuzzy identity-based encryption
-
May 22-26, 2005
-
Sahai A, and Waters B, "Fuzzy identity-based encryption," in Proc. of 24th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, vol. 3494, pp.457-473, May 22-26, 2005.
-
Proc. of 24th Annual Int. Conf. On the Theory and Applications of Cryptographic Techniques
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
5
-
-
34547579290
-
Identity based strong designated verifier signature scheme
-
Kancharla PK, Gummadidala S, and Saxena A, "Identity based strong designated verifier signature scheme," Informatica, vol. 18, no. 2, pp. 239-252, 2007.
-
(2007)
Informatica
, vol.18
, Issue.2
, pp. 239-252
-
-
Kancharla, P.K.1
Gummadidala, S.2
Saxena, A.3
-
6
-
-
77949821186
-
Delegatability of an identity based strong designated verifier signature scheme
-
Sun X, Li J, Yin H, and Chen G, "Delegatability of an identity based strong designated verifier signature scheme," Informatica, vol. 21, no. 1, pp. 117-122, 2010.
-
(2010)
Informatica
, vol.21
, Issue.1
, pp. 117-122
-
-
Sun, X.1
Li, J.2
Yin, H.3
Chen, G.4
-
7
-
-
38149029815
-
A biometric identity based signature scheme
-
Burnett A, Byrne F, Dowling T, and Duffy A, "A biometric identity based signature scheme," International Journal of Network Security, vol. 5, no. 3, pp. 317-326, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
8
-
-
84863229911
-
A new special biometric identity based signature scheme
-
Liu X, Miao Q, and Li D, "A new special biometric identity based signature scheme," International Journal of Security and its Applications, vol. 2, no.1, pp. 13-18, 2008.
-
(2008)
International Journal of Security and Its Applications
, vol.2
, Issue.1
, pp. 13-18
-
-
Liu, X.1
Miao, Q.2
Li, D.3
-
9
-
-
1342275940
-
-
Springer Publishing Company, New York
-
Maltoni D, Maio D, Jain AK, and Prabhakar S, Handbook of Fingerprint Recognition, Springer Publishing Company, New York, 2009.
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
10
-
-
77956519688
-
Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication
-
June 13-18, 2010
-
Sanjay K, Dijana P, and Bernadette D, "Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication," in Proc. of IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 138-145, June 13-18, 2010.
-
Proc. of IEEE Computer Society Conference On Computer Vision and Pattern Recognition Workshops
, pp. 138-145
-
-
Sanjay, K.1
Dijana, P.2
Bernadette, D.3
-
11
-
-
51849100389
-
Security system using biometric technology: Design and implementation of voice recognition systems
-
May 13-15, 2008
-
Rashid RA, Mahalin NH, Sarijari MA, "Security system using biometric technology: design and implementation of voice recognition systems," in Proc. of Int. Conf. on Computer and Communication Engineering, pp. 898-902, May 13-15, 2008.
-
Proc. of Int. Conf. On Computer and Communication Engineering
, pp. 898-902
-
-
Rashid, R.A.1
Mahalin, N.H.2
Sarijari, M.A.3
-
12
-
-
78149285836
-
A dynamic texture-based approach to recognition of facial actions and their temporal models
-
Koelstra S, Pantic M, Dynamic A, "A dynamic texture-based approach to recognition of facial actions and their temporal models," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 11, pp. 1-15, 2010.
-
(2010)
IEEE Transactions On Pattern Analysis and Machine Intelligence
, vol.32
, Issue.11
, pp. 1-15
-
-
Koelstra, S.1
Pantic, M.2
Dynamic, A.3
-
14
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, A. Smith. "Fuzzy extractors: how to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM Journal On Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
15
-
-
0033281339
-
A fuzzy commitment scheme
-
November 1-4, 1999
-
Juels A, Wattenberg M, "A fuzzy commitment scheme," in Proc. of the 6th ACM Conf. on Computer and Communications Security, pp. 28-36, November 1-4, 1999.
-
Proc. of the 6th ACM Conf. On Computer and Communications Security
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
17
-
-
70349659491
-
A fuzzy identity based signature scheme
-
October 17-19, 2009
-
Wang C, Wei C, Yang L. "A fuzzy identity based signature scheme," in Proc. of Int. Conf. on E-Business and Information System Security, pp. 1-5, October 17-19, 2009.
-
Proc. of Int. Conf. On E-Business and Information System Security
, pp. 1-5
-
-
Wang, C.1
Wei, C.2
Yang, L.3
-
18
-
-
74049149401
-
Two constructions of fuzzy identity based signature
-
October 17-19, 2009
-
Wang C, Kim JH, "Two constructions of fuzzy identity based signature," in Proc. of 2nd Int. Conf. on Biomedical Engineering and Informatics, pp. 1-5, October 17-19, 2009.
-
Proc. of 2nd Int. Conf. On Biomedical Engineering and Informatics
, pp. 1-5
-
-
Wang, C.1
Kim, J.H.2
-
19
-
-
37849024134
-
Certificate-based signature: Security model and efficient construction
-
June 28-30, 2007
-
Li J, Huang X, Mu Y, Susilo W, Wu Q, "Certificate-based signature: security model and efficient construction." in Proc. of European Public Key Infrastructure Workshop, vol. 4582, pp. 110-125, June 28-30, 2007.
-
Proc. of European Public Key Infrastructure Workshop
, vol.4582
, pp. 110-125
-
-
Li, J.1
Huang, X.2
Mu, Y.3
Susilo, W.4
Wu, Q.5
-
20
-
-
52149106742
-
Certificate-based signature schemes without pairings or random oracles
-
September 15-18, 2008
-
Liu J, Baek J, Susilo W, Zhou J, "Certificate-based signature schemes without pairings or random oracles," in Proc. of Information Security Conf, pp. 285-297, September 15-18, 2008.
-
Proc. of Information Security Conf
, pp. 285-297
-
-
Liu, J.1
Baek, J.2
Susilo, W.3
Zhou, J.4
-
21
-
-
33646844308
-
Generalized strong extractors and deterministic privacy amplification
-
March 14-18, 2005
-
Konig R, and Maurer U, "Generalized strong extractors and deterministic privacy amplification," in Proc. of Int. Workshop on Cryptography and Coding, vol. 3796, pp. 322-339, March 14-18, 2005.
-
Proc. of Int. Workshop On Cryptography and Coding
, vol.3796
, pp. 322-339
-
-
Konig, R.1
Maurer, U.2
-
22
-
-
20544433132
-
Improved randomness extraction from two independent sources
-
August 22-24, 2004
-
Dodis Y, Elbaz A, Oliveira R, and Raz R, "Improved randomness extraction from two independent sources," in Proc. of Int. Workshop on Randomization and Approximation Techniques in Computer Science, pp 334-344, August 22-24, 2004.
-
Proc. of Int. Workshop On Randomization and Approximation Techniques In Computer Science
, pp. 334-344
-
-
Dodis, Y.1
Elbaz, A.2
Oliveira, R.3
Raz, R.4
-
23
-
-
52149090133
-
An improved robust fuzzy extractor
-
September 10-12, 2008
-
Kanukurthi B, L. Reyzin, "An improved robust fuzzy extractor," in Proc. of 6th Conf. on Security and Cryptography for Networks, vol. 5229, pp. 156-171, September 10-12, 2008.
-
Proc. of 6th Conf. On Security and Cryptography For Networks
, vol.5229
, pp. 156-171
-
-
Kanukurthi, B.1
Reyzin, L.2
-
24
-
-
80655123664
-
A Fuzzy Extractor Based on Smooth Entropy
-
December 10-12, 2009
-
Yang B, Sun A, and Zhang W, "A Fuzzy Extractor Based on Smooth Entropy," in Proc. of 2nd Int. Conf. on Computer Science and its Applications, pp. 1-6, December 10-12, 2009.
-
Proc. of 2nd Int. Conf. On Computer Science and Its Applications
, pp. 1-6
-
-
Yang, B.1
Sun, A.2
Zhang, W.3
-
26
-
-
84883442157
-
A fully robust fuzzy extractor
-
October 10-11, 2009
-
Yang B, Sun A, and Zhang W, "A fully robust fuzzy extractor," in Proc. of IEEE Int. Conf. on Network Infrastructure and Digital Content, pp. 552-556, October 10-11, 2009.
-
Proc. of IEEE Int. Conf. On Network Infrastructure and Digital Content
, pp. 552-556
-
-
Yang, B.1
Sun, A.2
Zhang, W.3
-
27
-
-
70449614664
-
-
Tech. Rep. TR-CTIT-07-52, Centre for Telematics and Information Technology, University of Twente
-
Buhan I, Doumen J, Hartel P, and Veldhuis R, "Constructing practical fuzzy extractors using QIM," Tech. Rep. TR-CTIT-07-52, Centre for Telematics and Information Technology, University of Twente, 2007.
-
(2007)
Constructing Practical Fuzzy Extractors Using QIM
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
30
-
-
46749123123
-
Fuzzy key extraction from fingerprint biometrics based on dynamic quantization mechanism
-
August 29-31, 2007
-
Ong TS, "Fuzzy key extraction from fingerprint biometrics based on dynamic quantization mechanism," in Proc. of Third Int. Symposium on Information Assurance and Security, pp. 71-76, August 29-31, 2007.
-
Proc. of Third Int. Symposium On Information Assurance and Security
, pp. 71-76
-
-
Ong, T.S.1
-
31
-
-
84883332914
-
Biometric fuzzy extractor scheme for iris templates
-
July 13-16, 2009
-
Álvarez FH, and Encinas LH, "Biometric fuzzy extractor scheme for iris templates," in Proc. of the 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing, pp. 563-569, July 13-16, 2009.
-
Proc. of the 2009 World Congress In Computer Science, Computer Engineering, and Applied Computing
, pp. 563-569
-
-
Álvarez, F.H.1
Encinas, L.H.2
-
32
-
-
38049006519
-
Fuzzy extractors for minutiae-based fingerprint authentication
-
August 27-29, 2007
-
Arakala A, Jeffers J, and Horadam K, "Fuzzy extractors for minutiae-based fingerprint authentication," in Proc. of Advances in Biometrics, vol. 4642, pp. 760-769, August 27-29, 2007.
-
Proc. of Advances In Biometrics
, vol.4642
, pp. 760-769
-
-
Arakala, A.1
Jeffers, J.2
Horadam, K.3
-
33
-
-
51849101651
-
Fuzzy extractors for asymmetric biometric representations
-
June 23-28, 2008
-
Li Q, Guo M, and Chang E, "Fuzzy extractors for asymmetric biometric representations," in Proc. of IEEE Conf. on Computer Vision and Pattern Recognition Workshops, pp. 1-6, June 23-28, 2008.
-
Proc. of IEEE Conf. On Computer Vision and Pattern Recognition Workshops
, pp. 1-6
-
-
Li, Q.1
Guo, M.2
Chang, E.3
-
34
-
-
69949122147
-
Design and analysis of fuzzy extractors for faces
-
April 13-16, 2009
-
Sutcu Y, Li Q, and Memon N, "Design and analysis of fuzzy extractors for faces," in Proc. of theSPIE Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, vol. 7306, pp. 71-76, April 13-16, 2009.
-
Proc. of TheSPIE Optics and Photonics In Global Homeland Security V and Biometric Technology For Human Identification VI
, vol.7306
, pp. 71-76
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
|