-
1
-
-
77952049139
-
Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer
-
Atah JA, Howells G (2009) Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer, pp 170–177
-
(2009)
pp 170–177
-
-
Atah, J.A.1
Howells, G.2
-
2
-
-
33947506091
-
Method for producing a digital signature with aid of a biometric feature
-
Bodo A (1994) Method for producing a digital signature with aid of a biometric feature. German Patent DE 42(43):908
-
(1994)
German Patent DE
, vol.42
, Issue.43
, pp. 908
-
-
Bodo, A.1
-
3
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Trans Inf Forensics Secur 3(4):673–683
-
(2008)
IEEE Trans Inf Forensics Secur
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
4
-
-
84911438843
-
Cloud-based adaptive compression and secure management services for 3d healthcare data
-
Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Futur Gener Comput Syst 43:120–134
-
(2015)
Futur Gener Comput Syst
, vol.43
, pp. 120-134
-
-
Castiglione, A.1
Pizzolante, R.2
De Santis, A.3
Carpentieri, B.4
Castiglione, A.5
Palmieri, F.6
-
5
-
-
38149030200
-
Biometric encryption: a positive-sum technology that achieves strong authentication
-
Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication. Secur Priv, p 15
-
(2007)
Secur Priv
, pp. 15
-
-
Cavoukian, A.1
Stoianov, A.2
-
6
-
-
84865727735
-
Service-oriented architecture based on biometric using random features and incremental neural networks
-
Choi K, Toh KA, Uh Y, Byun H (2012) Service-oriented architecture based on biometric using random features and incremental neural networks. Soft Comput 16(9):1539–1553
-
(2012)
Soft Comput
, vol.16
, Issue.9
, pp. 1539-1553
-
-
Choi, K.1
Toh, K.A.2
Uh, Y.3
Byun, H.4
-
7
-
-
84937704662
-
Secure smartcardbased fingerprint authentication
-
ACM SIGMM workshop on biometrics methods and applications, ACM
-
Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications, ACM, pp 45–52
-
(2003)
Proceedings of the
, vol.2003
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
8
-
-
84888842651
-
Interconnecting federated clouds by using publish-subscribe service
-
Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903
-
(2013)
Clust Comput
, vol.16
, Issue.4
, pp. 887-903
-
-
Esposito, C.1
Ficco, M.2
Palmieri, F.3
Castiglione, A.4
-
10
-
-
79960768737
-
Efficient cancelable biometric key generation scheme for cryptography
-
Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69
-
(2010)
IJ Netw Secur
, vol.11
, Issue.2
, pp. 61-69
-
-
Gaddam, S.V.1
Lal, M.2
-
11
-
-
16244386253
-
Feasibility of generating biometric encryption keys
-
Hoque S, Fairhurst M, Howells G, Deravi F (2005) Feasibility of generating biometric encryption keys. Electron Lett 41(6):309–311
-
(2005)
Electron Lett
, vol.41
, Issue.6
, pp. 309-311
-
-
Hoque, S.1
Fairhurst, M.2
Howells, G.3
Deravi, F.4
-
12
-
-
79951844995
-
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
-
Kelkboom EJ, Breebaart J, Kevenaar TA, Buhan I, Veldhuis RN (2011) Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans Inf Forensics Secur 6(1):107–121
-
(2011)
IEEE Trans Inf Forensics Secur
, vol.6
, Issue.1
, pp. 107-121
-
-
Kelkboom, E.J.1
Breebaart, J.2
Kevenaar, T.A.3
Buhan, I.4
Veldhuis, R.N.5
-
13
-
-
84910124384
-
Secure biometric template generation for multi-factor authentication
-
Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recognit 48(2):458–472
-
(2015)
Pattern Recognit
, vol.48
, Issue.2
, pp. 458-472
-
-
Khan, S.H.1
Akbar, M.A.2
Shahzad, F.3
Farooq, M.4
Khan, Z.5
-
14
-
-
77952878891
-
Privacy-preserving similarity evaluation and application to remote biometrics authentication
-
Kikuchi H, Nagai K, Ogata W, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536
-
(2010)
Soft Comput
, vol.14
, Issue.5
, pp. 529-536
-
-
Kikuchi, H.1
Nagai, K.2
Ogata, W.3
Nishigaki, M.4
-
15
-
-
76549089793
-
Hidden attribute-based signatures without anonymity revocation
-
Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689
-
(2010)
Inf Sci
, vol.180
, Issue.9
, pp. 1681-1689
-
-
Li, J.1
Kim, K.2
-
16
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
Proceedings IEEE, IEEE
-
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010a) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–5
-
(2010)
INFOCOM
, vol.2010
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
17
-
-
80053563168
-
Enhancing attribute-based encryption with attribute hierarchy
-
Li J, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561
-
(2011)
Mob Netw Appl
, vol.16
, Issue.5
, pp. 553-561
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Ren, K.4
-
18
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210
-
(2014)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.8
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.3
Chen, X.4
Xiang, Y.5
-
19
-
-
77951206096
-
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
-
Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010b) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220
-
(2010)
J Netw Comput Appl
, vol.33
, Issue.3
, pp. 207-220
-
-
Li, P.1
Yang, X.2
Cao, K.3
Tao, X.4
Wang, R.5
Tian, J.6
-
20
-
-
84862815756
-
An effective biometric cryptosystem combining fingerprints with error correction codes
-
Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574
-
(2012)
Expert Syst Appl
, vol.39
, Issue.7
, pp. 6562-6574
-
-
Li, P.1
Yang, X.2
Qiao, H.3
Cao, K.4
Liu, E.5
Tian, J.6
-
21
-
-
84855909777
-
An efficient dynamic reliability-dependent bit allocation for biometric discretization
-
Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971
-
(2012)
Pattern Recognit
, vol.45
, Issue.5
, pp. 1960-1971
-
-
Lim, M.H.1
Teoh, A.B.J.2
Toh, K.A.3
-
22
-
-
77951867410
-
Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics
-
Nagar A, Rane S, Vetro A (2010) Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics, pp 75,410N–75,410N
-
(2010)
pp 75,410N–75,410N
-
-
Nagar, A.1
Rane, S.2
Vetro, A.3
-
24
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics
-
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:1–25
-
(2011)
EURASIP J Inf Secur
, vol.1
, pp. 1-25
-
-
Rathgeb, C.1
Uhl, A.2
-
25
-
-
84893178035
-
Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer
-
Rathgeb C, Uhl A, Wild P (2013) Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer, pp 374–381
-
(2013)
pp 374–381
-
-
Rathgeb, C.1
Uhl, A.2
Wild, P.3
-
26
-
-
84991804229
-
Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE
-
Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE, pp 1–6
-
(2007)
pp 1–6
-
-
Scheirer, W.J.1
Boult, T.E.2
-
27
-
-
44049084315
-
Template-free biometric-key generation by means of fuzzy genetic clustering
-
Sheng W, Howells G, Fairhurst M, Deravi F (2008) Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Trans Inf Forensics Secur 3(2):183–191
-
(2008)
IEEE Trans Inf Forensics Secur
, vol.3
, Issue.2
, pp. 183-191
-
-
Sheng, W.1
Howells, G.2
Fairhurst, M.3
Deravi, F.4
-
28
-
-
51849094958
-
-
Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6
-
Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6
-
-
-
-
30
-
-
26444525625
-
Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer
-
Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer, pp 310–319
-
(2005)
pp 310–319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
31
-
-
84947071237
-
A new proxy re-encryption scheme for protecting critical information systems
-
Wang XA, Ma J, Yang X (2015) A new proxy re-encryption scheme for protecting critical information systems. J Ambient Intell Humaniz Comput pp 1–13. doi:10.1007/s12652-015-0261-3
-
(2015)
J Ambient Intell Humaniz Comput
, pp. 1-13
-
-
Wang, X.A.1
Ma, J.2
Yang, X.3
-
32
-
-
80053099833
-
Improved cancelable fingerprint fuzzy vault system
-
Zhang R, Liu E, Zhao H, Pang L (2011) Improved cancelable fingerprint fuzzy vault system. J Xidian Univ 38(4):173–180
-
(2011)
J Xidian Univ
, vol.38
, Issue.4
, pp. 173-180
-
-
Zhang, R.1
Liu, E.2
Zhao, H.3
Pang, L.4
|