-
2
-
-
84956648682
-
The law and use of biometrics
-
Flynn P, Ross AA, Springer, New York
-
Woodward JJD (2008) The law and use of biometrics. In: Jain AK, Flynn P, Ross AA (eds) Handbook of Biometrics. Springer, New York
-
(2008)
Jain AK
-
-
Woodward, J.1
-
3
-
-
84956641872
-
-
Tech rep, 1980accessed in December
-
Guidelines on the protection of privacy and transborder flows of personal data. OECD (Organisation for Economic Co-operation and Development), Paris, France. Tech rep, 1980 (accessed in December 2012). [Online]. Available: www.oecd.org/document/18/0,2340, en_2649_34255_1815186_1_1_1_1,00.html
-
(2012)
OECD (Organisation for Economic Co-Operation and Development), Paris, France
-
-
-
4
-
-
38049172388
-
-
Tech rep, August, accessed in December 2012
-
Privacy technology implementation guide. Homeland security. Tech rep, 16 August 2007 (accessed in December 2012). [Online]. Available: http://www.dhs.gov/xlibrary/assets/privacy/privacy/guide/ptig.pdf
-
(2007)
Homeland Security
, vol.16
-
-
-
6
-
-
54049091377
-
Biometrics, human body and medicine: A controversial history
-
Duquenoy P, George C, Kimppa K, Idea Group Inc, Hershey
-
Mordini E (2008) Biometrics, human body and medicine: a controversial history. In: Duquenoy P, George C, Kimppa K (eds) Ethical, Legal and Social Issues in Medical Informatics. Idea Group Inc, Hershey
-
(2008)
Ethical, Legal and Social Issues in Medical Informatics
-
-
Mordini, E.1
-
7
-
-
84956614008
-
-
Tech rep, September
-
Biometric security concerns. UK biometric working group. Tech rep, September 2003
-
(2003)
UK Biometric Working Group
-
-
-
8
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3):614-634
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
9
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints
-
Uludag U, Jain A (2003) Attacks on biometric systems: a case study in fingerprints. In: Proc SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, 18-22 January 2003, pp 622-633
-
(2003)
Proc SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, 18-22 January
, vol.2003
, pp. 622-633
-
-
Uludag, U.1
Jain, A.2
-
11
-
-
33846817469
-
Biometric attack vectors and defences
-
Roberts C (2006) Biometric attack vectors and defences.Computers & Security 26(1)
-
(2006)
Computers & Security
, vol.26
, Issue.1
-
-
Roberts, C.1
-
15
-
-
38149030200
-
Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy, Toronto, Canada
-
December
-
Cavoukian BA, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication, security and privacy, Toronto, Canada. Tech rep, 2007 (accessed in December 2012). [Online]. Available: www.ipc.on.ca
-
(2007)
Tech Rep2007
-
-
Cavoukian, B.A.1
Stoianov, A.2
-
18
-
-
71749106685
-
A reference architecture for biometric template protection based on pseudo identities
-
Germany, September
-
Breebaart J, Busch C, Grave J, Kindt E (2008) A reference architecture for biometric template protection based on pseudo identities. In: BIOSIG, Darmstadt, Germany, September 2008
-
(2008)
BIOSIG, Darmstadt
, pp. 2008
-
-
Breebaart, J.1
Busch, C.2
Grave, J.3
Kindt, E.4
-
19
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
Cambridge, UK
-
Savvides M, Vijaya Kumar BVK, Khosla PK (2004) Cancelable biometric filters for face recognition. In: Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, vol 3, Cambridge, UK, August 2004, pp 922-925
-
(2004)
Proceedings of the 17Th International Conference on Pattern Recognition, ICPR 2004
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.2
Khosla, P.K.3
-
21
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):561-572
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
22
-
-
62349084871
-
Cracking cancelable fingerprint template of Ratha
-
ISCSCT’08, Shanghai, China, December
-
Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of Ratha. In: International Symposium on Computer Science and Computational Technology, ISCSCT’08, Shanghai, China, December 2008, pp 572-575
-
(2008)
International Symposium on Computer Science and Computational Technology
, pp. 572-575
-
-
Quan, F.1
Fei, S.2
Anni, C.3
Feifei, Z.4
-
23
-
-
67549112548
-
Generating registration-free cancelable fingerprint templates
-
BTAS’08, Washington, DC, USA, September, October
-
Chikkerur S, Ratha N, Connell J, Bolle R (2008) Generating registration-free cancelable fingerprint templates. In: IEEE Second International Conference on Biometrics: Theory, Applications and Systems, BTAS’08, Washington, DC, USA, 28 September-1 October 2008
-
(2008)
IEEE Second International Conference on Biometrics: Theory, Applications and Systems
, vol.28
, Issue.1
-
-
Chikkerur, S.1
Ratha, N.2
Connell, J.3
Bolle, R.4
-
24
-
-
54049133294
-
Cancelable voiceprint templates based on knowledge signatures
-
China, August
-
Xu W, He Q, Li Y, Li T (2008) Cancelable voiceprint templates based on knowledge signatures. In: Proceedings of the 2008 International Symposium on Electronic Commerce and Security, ISECS’08, Guangzhou, China, August 2008
-
(2008)
Proceedings of the 2008 International Symposium on Electronic Commerce and Security, ISECS’08, Guangzhou
, pp. 2008
-
-
Xu, W.1
He, Q.2
Li, Y.3
Li, T.4
-
25
-
-
51849116466
-
Template protection for hmm-based on-line signature authentication
-
June
-
Maiorana E, Martinez-Diaz M, Campisi P, Ortega-Garcia J, Neri A (2008) Template protection for hmm-based on-line signature authentication. In: IEEE Intl Conf on Computer Vision and Pattern Recognition, Anchorage, Alaska, USA, 23-28 June 2008
-
(2008)
IEEE Intl Conf on Computer Vision and Pattern Recognition, Anchorage, Alaska, USA
, vol.23-28
-
-
Maiorana, E.1
Martinez-Diaz, M.2
Campisi, P.3
Ortega-Garcia, J.4
Neri, A.5
-
26
-
-
77951209095
-
Cancelable templates for sequence based biometrics with application to on-line signature recognition
-
Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J, Neri A (2010) Cancelable templates for sequence based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man and Cybernetics. Part A 40(3):525-538
-
(2010)
IEEE Transactions on Systems, Man and Cybernetics. Part A
, vol.40
, Issue.3
, pp. 525-538
-
-
Maiorana, E.1
Campisi, P.2
Fierrez, J.3
Ortega-Garcia, J.4
Neri, A.5
-
27
-
-
84922512713
-
The practical subtleties of biometric key generation
-
July-1 August 2008
-
Ballard L, Kamara S, Reiter M (2008) The practical subtleties of biometric key generation. In: 17th Annual USENIX Security Symposium, San Jose, CA, USA, 28 July-1 August 2008
-
(2008)
17Th Annual USENIX Security Symposium, San Jose, CA, USA
, vol.28
-
-
Ballard, L.1
Kamara, S.2
Reiter, M.3
-
28
-
-
0034829626
-
Cryptographic key generation from voice
-
Monrose F, Reiter M, Li Q, Wetzel S (2001) Cryptographic key generation from voice. In: IEEE Symp on Security and Privacy, Oakland, CA, USA, May 2001
-
(2001)
IEEE Symp on Security and Privacy, Oakland, CA, USA
-
-
Monrose, F.1
Reiter, M.2
Li, Q.3
Wetzel, S.4
-
29
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
Lecture Notes on Computer Science, vol
-
Goh A, Ngo D (2003) Computation of cryptographic keys from face biometrics. In: International Federation for Information Processing. Lecture Notes on Computer Science, vol 2828
-
(2003)
International Federation for Information Processing
-
-
Goh, A.1
Ngo, D.2
-
30
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
ICPR 2012, Tsukuba Science City, Japan, November
-
Vielhauer C, Steinmetz R, Mayerhoefer A (2002) Biometric hash based on statistical features of online signatures. In: 21st International Conference on Pattern Recognition, ICPR 2012, Tsukuba Science City, Japan, November 2012
-
(2002)
21St International Conference on Pattern Recognition
, pp. 2012
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhoefer, A.3
-
33
-
-
33750947671
-
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
-
Buffalo, New York, USA, October
-
Kuan Y, Goh A, Ngo D, Teoh A (2005) Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability. In: Proc Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005, Buffalo, New York, USA, October 2005, pp 27-32
-
(2005)
Proc Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
, pp. 27-32
-
-
Kuan, Y.1
Goh, A.2
Ngo, D.3
Teoh, A.4
-
34
-
-
37849025832
-
-
Lecture Notes on Computer Science
-
Freire M, Fierrez J, Galbally J, Ortega-Garcia J (2007) Biometric hashing based on genetic selection and its application to on-line signatures. In: Lecture Notes on Computer Science, vol 4642, pp 1134-1143
-
(2007)
Biometric Hashing Based on genetic selection and Its Application to On-Line Signatures
, vol.4642
, pp. 1134-1143
-
-
Freire, M.1
Fierrez, J.2
Galbally, J.3
Ortega-Garcia, J.4
-
35
-
-
70349297048
-
Towards practical biometric key generation with randomized biometric templates
-
CCS’08, Alexandria, VA, USA, October
-
Ballard L, Kamara S, Monrose F, Reiter MK (2008) Towards practical biometric key generation with randomized biometric templates. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS’08, Alexandria, VA, USA, October 2008
-
(2008)
Proceedings of the 15Th ACM Conference on Computer and Communications Security
, pp. 2008
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
Reiter, M.K.4
-
36
-
-
84886077390
-
Privacy preserving key generation for iris biometrics
-
CMS’10, Linz, Austria, May, June
-
Rathgeb C, Uhl A (2010) Privacy preserving key generation for iris biometrics. In: Proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS’10, Linz, Austria, 31 May-2 June 2010
-
(2010)
Proceedings of the 11Th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security
, vol.31
, Issue.2
-
-
Rathgeb, C.1
Uhl, A.2
-
37
-
-
0033281339
-
A fuzzy commitment scheme
-
November
-
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proc ACM Conf on Computer and Communications Security, CCS99, Singapore, November 1999, pp 28-36
-
(1999)
Proc ACM Conf on Computer and Communications Security, CCS99, Singapore
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
38
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometric based identification scheme
-
Paris, France, January
-
Davida G, Frankel Y, Matt B, Peralta R (1999) On the relation of error correction and cryptography to an off line biometric based identification scheme. In: Proceedings of WCC99, Workshop on coding and cryptography, Paris, France, January 1999
-
(1999)
Proceedings of WCC99, Workshop on Coding and Cryptography
, pp. 1999
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
Peralta, R.4
-
39
-
-
0036350106
-
A fuzzy vault scheme
-
June, July
-
Juels A, Sudan M (2002) A fuzzy vault scheme. In: IEEE Intl Symp on Information Theory, ISIT 2002, Lausanne, Switzerland, 30 June-5 July 2002
-
(2002)
IEEE Intl Symp on Information Theory, ISIT 2002, Lausanne, Switzerland
, vol.30
, Issue.5
-
-
Juels, A.1
Sudan, M.2
-
40
-
-
8844277754
-
Privacy protected biometric templates: Acoustic ear identification
-
Orlando, FL, USA, April
-
Tuyls P, Verbitsky E, Ignatenko T, Schobben D, Akkermans A (2004) Privacy protected biometric templates: acoustic ear identification. In: Proceedings SPIE, Biometric Technology for Human Identification, vol 5404, Orlando, FL, USA, April 2004, pp 176-182
-
(2004)
Proceedings SPIE, Biometric Technology for Human Identification
, vol.5404
, pp. 176-182
-
-
Tuyls, P.1
Verbitsky, E.2
Ignatenko, T.3
Schobben, D.4
Akkermans, A.5
-
41
-
-
26444507172
-
Practical biometric authentication with template protection
-
Rye Brook, NY, USA
-
Tuyls P, Akkermans A, Kevenaar T, Schrijen G, Bazen A, Veldhuis R (2005) Practical biometric authentication with template protection. In: AVBPA, Rye Brook, NY, USA, pp 436-446
-
(2005)
AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.4
Bazen, A.5
Veldhuis, R.6
-
43
-
-
33645656961
-
Face biometrics Brazil, with renewable templates
-
San Jose, CA, USA, January
-
Van der Veen M, Kevenaar T, Schrijen G-J, Akkermans T, Zuo F (2006) Face biometrics Brazil, with renewable templates. In: SPIE Proc on Security, Steganography, and Watermarking of Multimedia Contents, vol 6072, San Jose, CA, USA, January 2005
-
(2006)
SPIE Proc on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6072
, pp. 2005
-
-
Van Der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.4
Zuo, F.5
-
44
-
-
37849002150
-
3d face: Biometrics template protection for 3d face recognition
-
Kelkboom E, Gokberk B, Kevenaar T, Akkermans AHM, Van der Veen M (2007) 3d face: biometrics template protection for 3d face recognition. In: Lecture Notes on Computer Science, vol 4642, pp 566-573
-
(2007)
In: Lecture Notes on Computer Science
, vol.4642
, pp. 566-573
-
-
Kelkboom, E.1
Gokberk, B.2
Kevenaar, T.3
Akkermans, A.4
Van Der Veen, M.5
-
46
-
-
84956692516
-
Systematic construction of iris-based fuzzy commitment schemes
-
Italy, June
-
Rathgeb C, Uhl A (2009) Systematic construction of iris-based fuzzy commitment schemes. In: Proceedings of the Third International Conference on Advances in Biometrics, ICB’09, Alghero, Italy, June 2009
-
(2009)
Proceedings of the Third International Conference on Advances in Biometrics, ICB’09, Alghero
, pp. 2009
-
-
Rathgeb, C.1
Uhl, A.2
-
47
-
-
67549130623
-
User adaptive fuzzy commitment for signature templates protection and renewability
-
January-March. Special section on biometrics: advances in security, usability and interoperability
-
Maiorana E, Campisi P, Neri A (2008) User adaptive fuzzy commitment for signature templates protection and renewability. SPIE Journal of Electronic Imaging 17(1), January-March. Special section on biometrics: advances in security, usability and interoperability
-
(2008)
SPIE Journal of Electronic Imaging
, vol.17
, Issue.1
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
48
-
-
78149261619
-
Fuzzy commitment for function based signature template protection
-
Maiorana E, Campisi P (2010) Fuzzy commitment for function based signature template protection. IEEE Signal Processing Letters 17(3):249-252
-
(2010)
IEEE Signal Processing Letters
, vol.17
, Issue.3
, pp. 249-252
-
-
Maiorana, E.1
Campisi, P.2
-
49
-
-
84956703710
-
-
Workshop on Biometrics: Challenges Arising from Theory to Practice, August 2004
-
Uludag U, Jain A (2004) Fuzzy fingerprint vault. In: Workshop on Biometrics: Challenges Arising from Theory to Practice, August 2004, pp 13-16
-
(2004)
Fuzzy Fingerprint Vault. In
, pp. 13-16
-
-
Uludag, U.1
Jain, A.2
-
50
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
ICASSP 2005, Philadelphia, PA, USA, March
-
Yang S, Verbauwhede I (2005) Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE Intl Conf on Acoustics, Speech, and Signal Processing, ICASSP 2005, Philadelphia, PA, USA, March 2005, pp 609-612
-
(2005)
IEEE Intl Conf on Acoustics, Speech, and Signal Processing
, vol.2005
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
52
-
-
51149114188
-
On the applicability of offline signatures to the fuzzy vault construction
-
Brazil, September
-
Freire M, Fierrez J, Martinez-Diaz M, Ortega-Garcia J (2007) On the applicability of offline signatures to the fuzzy vault construction. In: Proc Intl Conf on Document Analysis and Recognition, ICDAR 2007, Brazil, September 2007
-
(2007)
Proc Intl Conf on Document Analysis and Recognition, ICDAR
, vol.2007
, pp. 2007
-
-
Freire, M.1
Fierrez, J.2
Martinez-Diaz, M.3
Ortega-Garcia, J.4
-
54
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
Springer, Berlin
-
Lee Y, Bae K, Lee S, Park K, Kim J (2007) Biometric key binding: fuzzy vault based on iris images. In: Lecture Notes on Computer Science, vol 4642. Springer, Berlin, pp 800-808
-
(2007)
Lecture Notes on Computer Science
, vol.4642
, pp. 800-808
-
-
Lee, Y.1
Bae, K.2
Lee, S.3
Park, K.4
Kim, J.5
-
56
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer, Berlin
-
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Eurocrypt. Lecture Notes on Computer Science, vol 3027. Springer, Berlin, pp 523-540
-
(2004)
Eurocrypt. Lecture Notes on Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
58
-
-
51849101651
-
Fuzzy extractors for asymmetric biometric representations
-
CVPRW’08, Anchorage, AK, USA, June
-
Li Q, Guo M, Chang E-C (2008) Fuzzy extractors for asymmetric biometric representations. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW’08, Anchorage, AK, USA, June 2008
-
(2008)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops
-
-
Li, Q.1
Guo, M.2
Chang, E.-C.3
-
59
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
Singapore, March 2007
-
Buhan I, Doumen J, Hartel P, Veldhuis R (2007) Fuzzy extractors for continuous distributions. In: 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, March 2007, pp 353-355
-
(2007)
2Nd ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 353-355
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
60
-
-
69949122147
-
Design and analysis of fuzzy extractors for faces
-
Orlando, Florida, USA, April
-
Sutcu Y, Li Q, Memon N (2009) Design and analysis of fuzzy extractors for faces. In: Proc SPIE Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, vol 7306, Orlando, Florida, USA, April 2009
-
(2009)
Proc SPIE Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI
, vol.7306
, pp. 2009
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
62
-
-
84862943231
-
Quantifying privacy and security of biometric fuzzy commitment
-
Washington, DC, USA, October
-
Zhou X, Kuijper A, Veldhuis R, Busch C (2011) Quantifying privacy and security of biometric fuzzy commitment. In: International Joint Conference on Biometrics, IJCB 11, Washington, DC, USA, October2011
-
(2011)
International Joint Conference on Biometrics, IJCB
, pp. 11
-
-
Zhou, X.1
Kuijper, A.2
Veldhuis, R.3
Busch, C.4
-
63
-
-
79951844995
-
Preventing the decod-ability attack based cross-matching in a fuzzy commitment scheme
-
Kelkboom E, Breebaart J, Kevenaar T, Buhan I, Veldhuis R (2011) Preventing the decod-ability attack based cross-matching in a fuzzy commitment scheme. IEEE Transactions on Information Forensics and Security 6(1):107-121
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 107-121
-
-
Kelkboom, E.1
Breebaart, J.2
Kevenaar, T.3
Buhan, I.4
Veldhuis, R.5
-
64
-
-
84866781016
-
Retrieving secrets from iris fuzzy commitment
-
ICB 12, New Delhi, India, March, April 2012
-
Zhou X, Kuijper A, Busch C (2012) Retrieving secrets from iris fuzzy commitment. In: International Conference on Biometrics, ICB 12, New Delhi, India, 29 March-1 April 2012
-
(2012)
International Conference on Biometrics
, vol.29
, Issue.1
-
-
Zhou, X.1
Kuijper, A.2
Busch, C.3
-
65
-
-
34247366845
-
Finding the original point set hidden among chaff
-
ASIACCS’06, Taipei, Taiwan, March 2006
-
Chang E-C, Shen R, Teo FW (2006) Finding the original point set hidden among chaff. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS’06, Taipei, Taiwan, March 2006, pp 182-188
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 182-188
-
-
Chang, E.-C.1
Shen, R.2
Teo, F.W.3
-
66
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
USA, September
-
Scheirer W, Boult T (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, Baltimore, MD, USA, September 2007
-
(2007)
Biometrics Symposium, Baltimore, MD
, pp. 2007
-
-
Scheirer, W.1
Boult, T.2
-
67
-
-
42949167255
-
Realization of correlation attack against the fuzzy vault scheme
-
San Jose, CA, USA, January
-
Kholmatov A, Yanikoglu B (2008) Realization of correlation attack against the fuzzy vault scheme. In: SPIE Symp Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol 6819, San Jose, CA, USA, January 2008
-
(2008)
SPIE Symp Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 2008
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
68
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Washington, DC, USA, October 2004
-
Boyen X (2004) Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 2004, pp 82-91
-
(2004)
Proceedings of the 11Th ACM Conference on Computer and Communications Security, CCS 2004
, pp. 82-91
-
-
Boyen, X.1
-
69
-
-
24944501364
-
Secure remote authentication using biometric data
-
Lecture Notes in Computer Science
-
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A (2005) Secure remote authentication using biometric data. In: Advances in Cryptology—EUROCRYPT 2005. Lecture Notes in Computer Science, vol 3494
-
(2005)
In: Advances in Cryptology—EUROCRYPT 2005
, vol.3494
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
70
-
-
34848837353
-
Correcting errors without leaking partial information
-
Baltimore, MD, USA, May 2005
-
Dodis Y, Smith A (2005) Correcting errors without leaking partial information. In: STOC’05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 2005, pp 654-663
-
(2005)
STOC’05: Proceedings of the 37Th Annual ACM Symposium on Theory of Computing
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
72
-
-
84870286539
-
A theoretical analysis of authentication, privacy, and reusability across secure biometric systems
-
Wang Y, Rane S, Draper SC, Ishwar P (2012) A theoretical analysis of authentication, privacy, and reusability across secure biometric systems. IEEE Transactions on Information Forensics and Security 7(6):1825-1840
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1825-1840
-
-
Wang, Y.1
Rane, S.2
Draper, S.C.3
Ishwar, P.4
-
73
-
-
35148846059
-
Secure biometric templates from fingerprint-face features
-
Workshop on biometrics, Minneapolis, MN, USA, June 2007
-
Sutcu Y, Li Q, Memon N (2007) Secure biometric templates from fingerprint-face features. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Workshop on biometrics, Minneapolis, MN, USA, June 2007
-
(2007)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
74
-
-
67549107384
-
Multibiometric template security using fuzzy vault
-
Washington, DC, USA
-
Nandakumar K, Jain AK (2008) Multibiometric template security using fuzzy vault. In: 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS’08, Washington, DC, USA
-
(2008)
In: 2Nd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS’08
-
-
Nandakumar, K.1
Jain, A.K.2
-
75
-
-
71749111955
-
Multi-algorithm fusion with template protection
-
Washington, DC, USA
-
Kelkboom E, Zhou X, Breebaart J, Veldhuis R, Busch C (2009) Multi-algorithm fusion with template protection. In: 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS’09, Washington, DC, USA
-
(2009)
In: 3Rd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS’09
-
-
Kelkboom, E.1
Zhou, X.2
Breebaart, J.3
Veldhuis, R.4
Busch, C.5
-
76
-
-
77956519688
-
Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication
-
Workshop on biometrics, San Francisco, USA, June
-
Kanade S, Petrovska-Delacretaz D, Dorizzi B (2010) Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Workshop on biometrics, San Francisco, USA, June 2010
-
(2010)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
-
-
Kanade, S.1
Petrovska-Delacretaz, D.2
Dorizzi, B.3
-
78
-
-
84956646282
-
-
December
-
Biometric identification technology ethics (BITE). Tech rep (accessed in December 2012). [Online]. Available: http://www.biteproject.org
-
(2012)
Tech Rep
-
-
-
79
-
-
84956708872
-
-
December
-
Homeland security, biometric identification & personal detection ethics (HIDE). Tech rep (accessed in December 2012). [Online]. Available: http://www.hideproject.org
-
(2012)
Tech Rep
-
-
-
80
-
-
85032521774
-
-
IRISS (Increasing Resilience in Surveillance Societies) EU Project. [Online]. Available: http://irissproject.eu/
-
-
-
-
81
-
-
85032542859
-
-
SURPRISE (Surveillance, Privacy and Security) EU Project. [Online]. Available: http://www.surprise-project.eu/
-
-
-
-
82
-
-
85032540062
-
-
3DFace, 3DFace EU Project. [Online]. Available: http://www.3dface.org/home/welcome
-
-
-
-
83
-
-
85032547287
-
-
TURBINE (TrUsted Revocable Biometric IdeNtitiEs) EU Project. [Online]. Available: http://www.turbine- project.eu/
-
-
-
-
84
-
-
85032552854
-
-
BEAT (Biometrics Evaluation and Testing) EU Project. [Online]. Available: http://www.beat-eu.org/
-
-
-
-
85
-
-
85032544325
-
-
TABULA RASA EU Project. [Online]. Available: http://www.tabularasa-euproject.org/project
-
-
-
-
86
-
-
84866776956
-
Criteria towards metrics for benchmarking template protection algorithms
-
ICB 12, New Delhi, India, March, April 2012
-
Simoens K, Yang B, Zhou X, Beato F, Busch C, Newton E, Preneel B (2012) Criteria towards metrics for benchmarking template protection algorithms. In: 5th IAPR International Conference on Biometrics, ICB 12, New Delhi, India, 29 March-1 April 2012
-
(2012)
5Th IAPR International Conference on Biometrics
, vol.29
, Issue.1
-
-
Simoens, K.1
Yang, B.2
Zhou, X.3
Beato, F.4
Busch, C.5
Newton, E.6
Preneel, B.7
|