-
2
-
-
67549108038
-
How crackers crack passwords or what passwords to avoid
-
August
-
ALVARE, A. How crackers crack passwords or what passwords to avoid. In Proceedings of the Second USENIX Security Workshop (August 1990), pp. 103–112.
-
(1990)
Proceedings of the Second USENIX Security Workshop
, pp. 103-112
-
-
Alvare, A.1
-
4
-
-
35148815257
-
Forgery quality and its implications for behavioral biometric security
-
October
-
BALLARD, L., LOPRESTI, D., AND MONROSE, F. Forgery quality and its implications for behavioral biometric security. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Special Edition) 37, 5 (October 2007), 1107–1118.
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Special Edition)
, vol.37
, Issue.5
, pp. 1107-1118
-
-
Ballard, L.1
Lopresti, D.2
Monrose, F.3
-
5
-
-
84876806083
-
Biometric authentication revisited: Understanding the impact of wolves in sheep’s clothing
-
Vancouver, BC, Canada, August
-
th Annual Usenix Security Symposium (Vancouver, BC, Canada, August 2006), pp. 29–41.
-
(2006)
th Annual Usenix Security Symposium
, pp. 29-41
-
-
Ballard, L.1
Monrose, F.2
Lopresti, D.3
-
7
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
CHANG, Y.-J., ZHANG, W., AND CHEN, T. Biometrics-Based Cryptographic Key Generation. In Proceedings of IEEE International Conference on Multimedia and Expo (ICME) (2004), vol. 3, pp. 2203–2206.
-
(2004)
Proceedings of IEEE International Conference on Multimedia and Expo (ICME)
, vol.3
, pp. 2203-2206
-
-
Chang, Y.-J.1
Zhang, W.2
Chen, T.3
-
8
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
DAUGMAN, J. The importance of being random: Statistical principles of iris recognition. Pattern Recognition 36 (2003), 279–291.
-
(2003)
Pattern Recognition
, vol.36
, pp. 279-291
-
-
Daugman, J.1
-
9
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
May
-
DAVIDA, G. I., FRANKEL, Y., AND MATT, B. J. On enabling secure applications through off-line biometric identification. In Proceedings of the 1998 IEEE Symposium on Security and Privacy (May 1998), pp. 148–157.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
11
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
of Lecture Notes in Computer Science, Springer-Verlag,. Full version appears as Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, IACR ePrint Cryptography Archive 2003/235
-
DODIS, Y., REYZIN, L., AND SMITH, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology - EUROCRYPT 2004 (2005), vol. 3027 of Lecture Notes in Computer Science, Springer-Verlag, pp. 523–540. Full version appears as Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, IACR ePrint Cryptography Archive 2003/235.
-
(2005)
Advances in Cryptology - EUROCRYPT 2004
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
13
-
-
0030701223
-
Misplaced trust: Kerberos 4 session keys
-
Washington, DC, USA, IEEE Computer Society
-
DOLE, B., LODIN, S., AND SPAFFORD, E. Misplaced trust: Kerberos 4 session keys. In Proceedings of the 1997 Symposium on Network and Distributed System Security (Washington, DC, USA, 1997), IEEE Computer Society, p. 60.
-
(1997)
Proceedings of the 1997 Symposium on Network and Distributed System Security
, pp. 60
-
-
Dole, B.1
Lodin, S.2
Spafford, E.3
-
14
-
-
0003532271
-
UNIX password security – ten years later
-
Berlin, Germany, of Lecture Notes in Computer Science, Springer-Verlag
-
FELDMEIER, D., AND KARN, P. UNIX password security – ten years later. In Advances in Cryptology – CRYPTO ’89 Proceedings (Berlin, Germany, 1990), vol. 435 of Lecture Notes in Computer Science, Springer-Verlag, pp. 44–63.
-
(1990)
Advances in Cryptology – CRYPTO ’89 Proceedings
, vol.435
, pp. 44-63
-
-
Feldmeier, D.1
Karn, P.2
-
17
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
HAO, F., AND WAH, C. Private key generation from on-line handwritten signatures. Information Management and Computer Security 10, 4 (2002), 159–164.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Hao, F.1
Wah, C.2
-
18
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
HASTAD, J., IMPAGLIAZZO, R., LEVIN, L., AND LUBY, M. A pseudorandom generator from any one-way function. SIAM Journal on Computing 28 (1998).
-
(1998)
SIAM Journal on Computing
, vol.28
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
22
-
-
77649250983
-
Secure sketch for biometric templates
-
LI, Q., SUTCU, Y., AND MEMON, N. Secure sketch for biometric templates. In In Proceedings of Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security (2006), pp. 99–113.
-
(2006)
Proceedings of Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
23
-
-
26444619774
-
The effectiveness of generative attacks on an online handwriting biometric
-
Hilton Rye Town, NY, USA
-
LOPRESTI, D. P., AND RAIM, J. D. The effectiveness of generative attacks on an online handwriting biometric. In Proceedings of the International Conference on Audio- and Video-based Biometric Person Authentication. Hilton Rye Town, NY, USA, 2005, pp. 1090–1099.
-
(2005)
Proceedings of the International Conference on Audio- And Video-Based Biometric Person Authentication
, pp. 1090-1099
-
-
Lopresti, D.P.1
Raim, J.D.2
-
24
-
-
1642298729
-
-
Tech. Rep. NPL Report CMSC 14/02, Centre for Mathematics and Scientific Computing, National Physical Laboratory, August
-
MANSFIELD, A. J., AND WAYMAN, J. L. Best practices in testing and reporting performance of biometric devices. Tech. Rep. NPL Report CMSC 14/02, Centre for Mathematics and Scientific Computing, National Physical Laboratory, August 2002.
-
(2002)
Best Practices in Testing and Reporting Performance of Biometric Devices
-
-
Mansfield, A.J.1
Wayman, J.L.2
-
26
-
-
34147095850
-
A non-iterative approach to reconstruct face templates from match scores
-
August
-
MOHANTY, P., SARKAR, S., AND KASTURI, R. A non-iterative approach to reconstruct face templates from match scores. In 18th International Conference on Pattern Recognition (ICPR 2006) (August 2006), pp. 598–601.
-
(2006)
18th International Conference on Pattern Recognition (ICPR 2006)
, pp. 598-601
-
-
Mohanty, P.1
Sarkar, S.2
Kasturi, R.3
-
27
-
-
85084163045
-
Towards speech-generated cryptographic keys on resource-constrained devices
-
MONROSE, F., REITER, M., LI, Q., LOPRESTI, D., AND SHIH, C. Towards speech-generated cryptographic keys on resource-constrained devices. In Proceedings of the Eleventh USENIX Security Symposium (2002), pp. 283–296.
-
(2002)
Proceedings of the Eleventh USENIX Security Symposium
, pp. 283-296
-
-
Monrose, F.1
Reiter, M.2
Li, Q.3
Lopresti, D.4
Shih, C.5
-
28
-
-
19444382525
-
Cryptographic key generation from voice (extended abstract)
-
May
-
MONROSE, F., REITER, M. K., LI, Q., AND WETZEL, S. Cryptographic key generation from voice (extended abstract). In Proceeedings of the 2001 IEEE Symposium on Security and Privacy (May 2001), pp. 12–25.
-
(2001)
Proceeedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 12-25
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
29
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
February
-
MONROSE, F., REITER, M. K., AND WETZEL, S. Password hardening based on keystroke dynamics. International Journal of Information Security 1, 2 (February 2002), 69–83.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
30
-
-
0030086632
-
Randomness is linear in space
-
NISAN, N., AND ZUCKERMAN, D. Randomness is linear in space. Journal of Computer and Systems Science 52, 1 (1996), 43–52.
-
(1996)
Journal of Computer and Systems Science
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
31
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
RATHA, N. K., CONNELL, J. H., AND BOLLE, R. M. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 3 (2001), 614–634.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
32
-
-
0003725141
-
-
Addison-Wesley Publishing, Reading, MA
-
SANKOFF, D., AND KRUSKAL, J. Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison, second ed. Addison-Wesley Publishing, Reading, MA, 1999.
-
(1999)
Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison, Second Ed.
-
-
Sankoff, D.1
Kruskal, J.2
-
33
-
-
0032224440
-
tm using image processing
-
IS&T/SPIE
-
tm using image processing. In Optical Security and Counterfeit Deterrence Techniques II (1998), vol. 3314, IS&T/SPIE, pp. 178–188.
-
(1998)
Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
35
-
-
33748076787
-
A secure biometric authentication scheme based on robust hashing
-
New York, NY, USA
-
SUTCU, Y., SENCAR, H. T., AND MEMON, N. A Secure Biometric Authentication Scheme based on Robust Hashing. In Proceedings of the 7th Workshop on Multimedia and Security (New York, NY, USA, 2005), pp. 111–116.
-
(2005)
Proceedings of the 7th Workshop on Multimedia and Security
, pp. 111-116
-
-
Sutcu, Y.1
Sencar, H.T.2
Memon, N.3
-
37
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints
-
ULUDAG, U., AND JAIN, A. Attacks on biometric systems: A case study in fingerprints. In Proceedings of SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633.
-
Proceedings of SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 622-633
-
-
Uludag, U.1
Jain, A.2
-
39
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
ULUDAG, U., PANKANTI, S., PRABHAKAR, S., AND JAIN, A. K. Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE: Special Issue on Multimedia Security of Digital Rights Management 92, 6 (2004), 948–960.
-
(2004)
Proceedings of the IEEE: Special Issue on Multimedia Security of Digital Rights Management
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
41
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
VIELHAUER, C., STEINMETZ, R., AND MAYERHOFER, A. Biometric hash based on statistical features of online signatures. In Proceedings of the Sixteenth International Conference on Pattern Recognition (2002), vol. 1, pp. 123–126.
-
(2002)
Proceedings of the Sixteenth International Conference on Pattern Recognition
, vol.1
, pp. 123-126
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhofer, A.3
-
42
-
-
0742302033
-
Fundamentals of biometric authentication technologies
-
January
-
WAYMAN, J. Fundamentals of biometric authentication technologies. International Journal of Image & Graphics 1, 1 (January 2001), 93–114.
-
(2001)
International Journal of Image & Graphics
, vol.1
, Issue.1
, pp. 93-114
-
-
Wayman, J.1
-
43
-
-
33947362012
-
A study on vulnerability in on-line writer verification system
-
Seoul, South Korea, August-September
-
YAMAZAKI, Y., NAKASHIMA, A., TASAKA, K., AND KOMATSU, N. A study on vulnerability in on-line writer verification system. In Proceedings of the Eighth International Conference on Document Analysis and Recognition (Seoul, South Korea, August-September 2005), pp. 640–644.
-
(2005)
Proceedings of the Eighth International Conference on Document Analysis and Recognition
, pp. 640-644
-
-
Yamazaki, Y.1
Nakashima, A.2
Tasaka, K.3
Komatsu, N.4
-
44
-
-
20444496565
-
Optimal thresholding for key generation based on biometrics
-
ZHANG, W., CHANG, Y.-J., AND CHEN, T. Optimal thresholding for key generation based on biometrics. In Proceedings of the International Conference on Image Processing (ICIP04) (2004), vol. 5, pp. 3451–3454.
-
(2004)
Proceedings of the International Conference on Image Processing (ICIP04)
, vol.5
, pp. 3451-3454
-
-
Zhang, W.1
Chang, Y.-J.2
Chen, T.3
-
45
-
-
34147129600
-
Cryptographic key generation from biometric data using lattice mapping
-
Washington, DC, USA, IEEE Computer Society
-
ZHENG, G., LI, W., AND ZHAN, C. Cryptographic key generation from biometric data using lattice mapping. In ICPR’06: Proceedings of the 18th International Conference on Pattern Recognition (Washington, DC, USA, 2006), IEEE Computer Society, pp. 513–516.
-
(2006)
ICPR’06: Proceedings of the 18th International Conference on Pattern Recognition
, pp. 513-516
-
-
Zheng, G.1
Li, W.2
Zhan, C.3
|