-
1
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Sec. Privacy, vol. 1, no. 2, pp. 33-42, 2003.
-
(2003)
IEEE Sec. Privacy
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
2
-
-
78650336968
-
Privacy protection in high security biometrics applications
-
ICEB A. Kumar and D. Zhang, Eds. New York; Springer
-
N. K. Ratha, "Privacy protection in high security biometrics applications," in ICEB (Lecture Notes in Computer Science, vol. 6005), A. Kumar and D. Zhang, Eds. New York; Springer, 2010, pp. 62-69.
-
(2010)
Lecture Notes in Computer Science
, vol.6005
, pp. 62-69
-
-
Ratha, N.K.1
-
5
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
6
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
A. C.-C. Yao, "How to generate and exchange secrets (extended abstract)," in FOCS, 1986, pp. 162-167.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
-
7
-
-
70350379222
-
Secure multiparty computation goes live
-
Financial Cryptography R. Dingledine and P. Golle, Eds. New York: Springer
-
P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. P. Jakobsen, M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. I. Schwartzbach, and T. Toft, "Secure multiparty computation goes live," in Financial Cryptography (Lecture Notes in Computer Science, vol. 5628), R. Dingledine and P. Golle, Eds. New York: Springer, 2009, pp. 325-343.
-
(2009)
Lecture Notes in Computer Science
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.P.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.11
Toft, T.12
-
8
-
-
69949163699
-
Privacy-preserving face recognition
-
Privacy Enhancing Technologies I. Goldberg and M. J. Atallah, Eds. New York: Springer
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Privacy Enhancing Technologies (Lecture Notes in Computer Science, vol. 5672), I. Goldberg and M. J. Atallah, Eds. New York: Springer, 2009, pp. 235-253.
-
(2009)
Lecture Notes in Computer Science
, vol.5672
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
9
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
ICISC D. Lee and S. Hong, Eds.New York: Springer
-
A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in ICISC (Lecture Notes in Computer Science, vol. 5984), D. Lee and S. Hong, Eds.New York: Springer, 2009, pp. 229-244.
-
(2009)
Lecture Notes in Computer Science
, vol.5984
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
10
-
-
74849096440
-
Anonymous biometric access control
-
S. Ye, Y. Luo, J. Zhao, and S.-C. S. Cheung, "Anonymous biometric access control," EURASIP J. Inform. Sec., vol. 2009, no. 2009:865259, 2009.
-
(2009)
EURASIP J. Inform. Sec
, vol.2009
, Issue.2009
, pp. 865259
-
-
Ye, S.1
Luo, Y.2
Zhao, J.3
Cheung, S.-C.S.4
-
11
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
[Online]
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "Privacy-preserving fingercode authentication," in Proc. 12th ACM Workshop on Multimedia and Security, 2010, pp. 231-240. [Online]. Available: http://doi.acm.org/10.1145/1854229.1854270 =0pt
-
(2010)
Proc. 12th ACM Workshop on Multimedia and Security
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Donida Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
Piva, A.11
-
12
-
-
77955178939
-
SCiFI: A system for secure face identification
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, "SCiFI: A system for secure face identification," in Proc. IEEE Symp. Security and Privacy, 2010, pp. 239-254.
-
(2010)
Proc. IEEE Symp. Security and Privacy
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
13
-
-
80053027350
-
Secure and efficient protocols for iris and fingerprint identification
-
ESORICS V. Atluri and C. Daz, Eds. New York; Springer
-
M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in ESORICS (Lecture Notes in Computer Science, vol. 6879), V. Atluri and C. Daz, Eds. New York; Springer, 2011, pp. 190-209.
-
(2011)
Lecture Notes in Computer Science
, vol.6879
, pp. 190-209
-
-
Blanton, M.1
Gasti, P.2
-
14
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
San Diego, CA
-
Y. Huang, L. Malka, D. Evans, and J. Katz, "Efficient privacy-preserving biometric identification," in Proc. Network and Distributed System Security Symp. San Diego, CA, 2011.
-
(2011)
Proc. Network and Distributed System Security Symp
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
15
-
-
84866777273
-
Faster secure computation for biometric identification using filtering
-
J. Bringer, H. Chabanne, M. Favre, and A. Patey, "Faster secure computation for biometric identification using filtering," in Proc. 5th IAPR Int. Conf. Biometrics, (ICB 2012), 2012, pp. 257-264.
-
(2012)
Proc. 5th IAPR Int. Conf. Biometrics, (ICB 2012)
, pp. 257-264
-
-
Bringer, J.1
Chabanne, H.2
Favre, M.3
Patey, A.4
-
16
-
-
79958010869
-
-
Springer, New York; Berlin, Germany; Vienna, Austria
-
C. Hazay and Y. Lindell, Efficient Secure Two-Party Protocols. Springer, New York; Berlin, Germany; Vienna, Austria, 2010.
-
(2010)
Efficient Secure Two-Party Protocols
-
-
Hazay, C.1
Lindell, Y.2
-
17
-
-
77953754678
-
How to exchange secrets with oblivious transfer
-
Harvard Univ., Cambridge, MA, Tech. Rep. TR-81
-
M. O. Rabin, "How to exchange secrets with oblivious transfer," Aiken Computation Lab, Harvard Univ., Cambridge, MA, Tech. Rep. TR-81, 1981.
-
(1981)
Aiken Computation Lab
-
-
Rabin, M.O.1
-
18
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Bethesda, MD, 31 May-2 June
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. on Theory of Computing (STOC 2009), Bethesda, MD, 31 May-2 June, 2009, pp. 169-178.
-
(2009)
Proc. 41st Annu. ACM Symp. on Theory of Computing (STOC 2009)
, pp. 169-178
-
-
Gentry, C.1
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
EUROCRYPT J. Stern, Ed. New York: Springer
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT (Lecture Notes in Computer Science, vol. 1592), J. Stern, Ed. New York: Springer, 1999, pp. 223-238.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
ICALP (2) L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, and I. Walukiewicz, Eds. New York, Springer
-
V. Kolesnikov and T. Schneider, "Improved garbled circuit: Free XOR gates and applications," in ICALP (2) (Lecture Notes in Computer Science), L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, and I. Walukiewicz, Eds. New York, Springer, 2008, pp. 486-498.
-
(2008)
Lecture Notes in Computer Science
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
21
-
-
0026065565
-
Eigenfaces for recognition
-
Jan
-
M. Turk and A. Pentland, "Eigenfaces for recognition," J. Cognit. Neurosci., vol. 3, no. 1, pp. 71-86, Jan. 1991.
-
(1991)
J. Cognit. Neurosci
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
-
22
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits," in Proc. USENIX Security Symposium, 2011, p. 35.
-
(2011)
Proc. USENIX Security Symposium
, pp. 35
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
23
-
-
0032675768
-
Fingercode: A filterbank for fingerprint representation and matching
-
Ft. Collins, CO 23-25 June [Online]
-
A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Fingercode: A filterbank for fingerprint representation and matching," in Proc. 1999 Conf. on Computer Vision and Pattern Recognition (CVPR '99), Ft. Collins, CO, 23-25 June 1999. [Online]. Available: http://doi.ieeecomputersociety.org/10. 1109/CVPR.1999.784628
-
(1999)
Proc. 1999 Conf. on Computer Vision and Pattern Recognition (CVPR '99)
-
-
Jain, A.K.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
24
-
-
84864828111
-
Private fingerprint matching
-
ACISP W. Susilo, Y. Mu, and J. Seberry, Eds. New York: Springer
-
S. F. Shahandashti, R. Safavi-Naini, and P. Ogunbona, "Private fingerprint matching," in ACISP (Lecture Notes in Computer Science, vol. 7372), W. Susilo, Y. Mu, and J. Seberry, Eds. New York: Springer, 2012, pp. 426-433.
-
(2012)
Lecture Notes in Computer Science
, vol.7372
, pp. 426-433
-
-
Shahandashti, S.F.1
Safavi-Naini, R.2
Ogunbona, P.3
-
25
-
-
0742290132
-
How iris recognition works
-
J. Daugman, "How iris recognition works," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 21-30, 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
26
-
-
79953241261
-
Secure two-party computation via cut-and-choose oblivious transfer
-
8th Theory of Cryptography Conf Y. Ishai, Ed. New York: Springer
-
Y. Lindell and B. Pinkas, "Secure two-party computation via cut-and-choose oblivious transfer," in 8th Theory of Cryptography Conf. (Lecture Notes in Computer Science, vol. 6597), Y. Ishai, Ed. New York: Springer, 2011, pp. 329-346.
-
(2011)
Lecture Notes in Computer Science
, vol.6597
, pp. 329-346
-
-
Lindell, Y.1
Pinkas, B.2
-
27
-
-
84865506559
-
A new approach to practical active-secure two-party computation
-
J. B. Nielsen, P. S. Nordholt, C. O. Orlandi, and S. S. Burra, "A new approach to practical active-secure two-party computation," in CRYPTO, 2012, pp. 681-700.
-
(2012)
CRYPTO
, pp. 681-700
-
-
Nielsen, J.B.1
Nordholt, P.S.2
Orlandi, C.O.3
Burra, S.S.4
-
28
-
-
77955312868
-
Embedded SFE: Offloading server and network using hardware tokens
-
Financial Cryptography R. Sion, Ed. New York: Springer
-
K. Järvinen, V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Embedded SFE: Offloading server and network using hardware tokens," in Financial Cryptography (Lecture Notes in Computer Science, vol. 6052), R. Sion, Ed. New York: Springer, 2010, pp. 207-221.
-
(2010)
Lecture Notes in Computer Science
, vol.6052
, pp. 207-221
-
-
Järvinen, K.1
Kolesnikov, V.2
Sadeghi, A.-R.3
Schneider, T.4
-
29
-
-
77954749319
-
Token-based cloud computing
-
TRUST A. Acquisti, S. W. Smith, and A.-R. Sadeghi, Eds. New York: Springer
-
A.-R. Sadeghi, T. Schneider, and M. Winandy, "Token-based cloud computing," in TRUST (Lecture Notes in Computer Science, vol. 6101), A. Acquisti, S. W. Smith, and A.-R. Sadeghi, Eds. New York: Springer, 2010, pp. 417-429.
-
(2010)
Lecture Notes in Computer Science
, vol.6101
, pp. 417-429
-
-
Sadeghi, A.-R.1
Schneider, T.2
Winandy, M.3
|