메뉴 건너뛰기




Volumn , Issue , 2008, Pages 61-74

The practical subtleties of biometric key generation

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 84922512713     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (71)

References (45)
  • 2
    • 67549108038 scopus 로고
    • How crackers crack passwords or what passwords to avoid
    • August
    • ALVARE, A. How crackers crack passwords or what passwords to avoid. In Proceedings of the Second USENIX Security Workshop (August 1990), pp. 103–112.
    • (1990) Proceedings of the Second USENIX Security Workshop , pp. 103-112
    • Alvare, A.1
  • 8
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • DAUGMAN, J. The importance of being random: Statistical principles of iris recognition. Pattern Recognition 36 (2003), 279–291.
    • (2003) Pattern Recognition , vol.36 , pp. 279-291
    • Daugman, J.1
  • 11
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • of Lecture Notes in Computer Science, Springer-Verlag,. Full version appears as Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, IACR ePrint Cryptography Archive 2003/235
    • DODIS, Y., REYZIN, L., AND SMITH, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology - EUROCRYPT 2004 (2005), vol. 3027 of Lecture Notes in Computer Science, Springer-Verlag, pp. 523–540. Full version appears as Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, IACR ePrint Cryptography Archive 2003/235.
    • (2005) Advances in Cryptology - EUROCRYPT 2004 , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 12
  • 14
    • 0003532271 scopus 로고
    • UNIX password security – ten years later
    • Berlin, Germany, of Lecture Notes in Computer Science, Springer-Verlag
    • FELDMEIER, D., AND KARN, P. UNIX password security – ten years later. In Advances in Cryptology – CRYPTO ’89 Proceedings (Berlin, Germany, 1990), vol. 435 of Lecture Notes in Computer Science, Springer-Verlag, pp. 44–63.
    • (1990) Advances in Cryptology – CRYPTO ’89 Proceedings , vol.435 , pp. 44-63
    • Feldmeier, D.1    Karn, P.2
  • 17
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • HAO, F., AND WAH, C. Private key generation from on-line handwritten signatures. Information Management and Computer Security 10, 4 (2002), 159–164.
    • (2002) Information Management and Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Hao, F.1    Wah, C.2
  • 31
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • RATHA, N. K., CONNELL, J. H., AND BOLLE, R. M. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 3 (2001), 614–634.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 42
    • 0742302033 scopus 로고    scopus 로고
    • Fundamentals of biometric authentication technologies
    • January
    • WAYMAN, J. Fundamentals of biometric authentication technologies. International Journal of Image & Graphics 1, 1 (January 2001), 93–114.
    • (2001) International Journal of Image & Graphics , vol.1 , Issue.1 , pp. 93-114
    • Wayman, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.