-
1
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
DOI 10.1109/TIFS.2007.908165
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inform. Forensics Sec., vol. 2, no. 4, pp. 744-757, Dec. 2007. (Pubitemid 350157947)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
2
-
-
77957941531
-
Securing fingerprint template: Fuzzy vault with minutiae descriptors
-
Dec.
-
A. Nagar, K. Nandakumar, and A. Jain, "Securing fingerprint template: Fuzzy vault with minutiae descriptors," in Proc. Int. Conf. Pattern Recognition, Tampa, FL, Dec. 2008, pp. 1-4.
-
(2008)
Proc. Int. Conf. Pattern Recognition, Tampa, FL
, pp. 1-4
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.3
-
4
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sept.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inform. Forensics Sec., vol. 2, no. 3, pp. 503-512, Sept. 2007.
-
(2007)
IEEE Trans. Inform. Forensics Sec.
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
5
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Berkeley, CA, Nov.
-
T. Clancy, N. Kiyavash, and D. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACM Workshop Biometric Methods and Applications, Berkeley, CA, Nov. 2003, pp. 45-52.
-
(2003)
Proc. ACM Workshop Biometric Methods and Applications
, pp. 45-52
-
-
Clancy, T.1
Kiyavash, N.2
Lin, D.3
-
6
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
Philadelphia, PA, Mar.
-
S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Philadelphia, PA, Mar. 2005, vol. 5, pp. 609-612.
-
(2005)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP)
, vol.5
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
8
-
-
30844458593
-
A fuzzy vault scheme
-
DOI 10.1007/s10623-005-6343-z
-
A. Juels and M. Sudan, "A fuzzy vault scheme," Designs Codes Cryptogr., vol. 38, no. 2, pp. 237-257, Feb. 2006. (Pubitemid 43102559)
-
(2006)
Designs, Codes, and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
9
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Honolulu, HI, Apr.
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. Yedidia, "Using distributed source coding to secure fingerprint biometrics," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Honolulu, HI, Apr. 2007, pp. 129-132.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 129-132
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.5
-
10
-
-
52349098088
-
Feature extraction for a Slepian-Wolf biometric system using LDPC codes
-
Toronto, Canada, July
-
Y. Sutcu, S. Rane, J. S. Yedidia, S. C. Draper, and A. Vetro, "Feature extraction for a Slepian-Wolf biometric system using LDPC codes," in Proc. IEEE Int. Symp. Information Theory, Toronto, Canada, July 2008, pp. 2297-2301.
-
(2008)
Proc. IEEE Int. Symp. Information Theory
, pp. 2297-2301
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.S.3
Draper, S.C.4
Vetro, A.5
-
11
-
-
77949833513
-
Leveraging reliable bits: ECC considerations in secure biometrics
-
London, U.K. Dec.
-
Y. Wang, S. Rane, and A. Vetro, "Leveraging reliable bits: ECC considerations in secure biometrics," in Proc. IEEE Workshop Information Forensics and Security, London, U.K., Dec. 2009, pp. 71-75.
-
(2009)
Proc. IEEE Workshop Information Forensics and Security
, pp. 71-75
-
-
Wang, Y.1
Rane, S.2
Vetro, A.3
-
12
-
-
79951830125
-
Privacy-security tradeoff in biometric security systems-Part I: Single use case
-
Mar.
-
L. Lai, S. W. Ho, and H. V. Poor, "Privacy-security tradeoff in biometric security systems-Part I: Single use case," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 1, pp. 122-139, Mar. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec.
, vol.6
, Issue.1
, pp. 122-139
-
-
Lai, L.1
Ho, S.W.2
Poor, H.V.3
-
13
-
-
79951822559
-
Privacy-security tradeoff in biometric security systems-Part II: Multiple uses case
-
Mar.
-
L. Lai, S. W. Ho, and H. V. Poor, "Privacy-security tradeoff in biometric security systems-Part II: Multiple uses case," IEEE Trans. Inform. Forensics Sec., vol. 6, no. I, pp. 140-151, Mar. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec.
, vol.6
, pp. 140-151
-
-
Lai, L.1
Ho, S.W.2
Poor, H.V.3
-
14
-
-
70450232005
-
Biometric systems: Privacy and secrecy aspects
-
Dec.
-
T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inform. Forensics Sec., vol. 4, no. 4, pp. 956-973, Dec. 2009.
-
(2009)
IEEE Trans. Inform. Forensics Sec.
, vol.4
, Issue.4
, pp. 956-973
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
15
-
-
84858252162
-
Biometric security from an information-theoretical perspective
-
Feb.
-
T. Ignatenko and F. M. J. Willems, "Biometric security from an information-theoretical perspective," Found. Trends Commun. Inform. Theory, vol. 7, nos. 2-3, pp. 135-316, Feb. 2012.
-
(2012)
Found. Trends Commun. Inform. Theory
, vol.7
, Issue.2-3
, pp. 135-316
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
16
-
-
80053027350
-
Secure and efficient protocols for iris and fingerprint identification
-
Leuven, Belgium, Sept.
-
M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in Proc. Eur. Symp. Research Computer Security (ESORICS), Leuven, Belgium, Sept. 2011, vol. 6879, pp. 190-209.
-
(2011)
Proc. Eur. Symp. Research Computer Security (ESORICS)
, vol.6879
, pp. 190-209
-
-
Blanton, M.1
Gasti, P.2
-
17
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
Rome, Italy, Sept.
-
M. Barni, T. Bianchi, D. Catalano, M. D. Raimondo, R. D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva, "Privacy-preserving fingercode authentication," in Proc. ACM Workshop Multimedia and Security (MMSEC), Rome, Italy, Sept. 2010, pp. 231-240.
-
(2010)
Proc. ACM Workshop Multimedia and Security (MMSEC)
, pp. 231-240
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Raimondo, M.D.4
Labati, R.D.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
Piva, A.11
-
18
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Seoul, Korea
-
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in Proc. Int. Conf. Information Security and Cryptology (ICISC '09), Seoul, Korea, pp. 229-244.
-
Proc. Int. Conf. Information Security and Cryptology (ICISC '09)
, pp. 229-244
-
-
Sadeghi, A.1
Schneider, T.2
Wehrenberg, I.3
-
19
-
-
77951204673
-
Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumption
-
May
-
E. Kelkboom, G. Molina, J. Breebaart, R. Veldhuis, T. Kevenaar, and W. Jonker, "Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumption," IEEE Trans. Syst. Man, Cybern. A, vol. 40, no. 3, pp. 555-571, May 2010.
-
(2010)
IEEE Trans. Syst. Man, Cybern. A
, vol.40
, Issue.3
, pp. 555-571
-
-
Kelkboom, E.1
Molina, G.2
Breebaart, J.3
Veldhuis, R.4
Kevenaar, T.5
Jonker, W.6
-
21
-
-
84870286539
-
A theoretical analysis of authentication, privacy and reusability across secure biometric systems
-
Dec.
-
Y. Wang, S. Rane, S. C. Draper, and P. Ishwar, "A theoretical analysis of authentication, privacy and reusability across secure biometric systems," IEEE Trans. Inform. Forensics Sec., vol. 7, no. 6, pp. 1825-1840, Dec. 2012.
-
(2012)
IEEE Trans. Inform. Forensics Sec.
, vol.7
, Issue.6
, pp. 1825-1840
-
-
Wang, Y.1
Rane, S.2
Draper, S.C.3
Ishwar, P.4
-
22
-
-
80051643550
-
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
-
Prague, Czech Republic, May
-
A. Talwai, F. M. Bui, A. Khisti, and D. Hatzinakos, "A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, May 2011, pp. 1924-1927.
-
(2011)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1924-1927
-
-
Talwai, A.1
Bui, F.M.2
Khisti, A.3
Hatzinakos, D.4
-
23
-
-
85032778698
-
Sheep, goats, lambs and wolves: An analysis of individual differences in speaker recognition performance
-
Nov.
-
G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "Sheep, goats, lambs and wolves: An analysis of individual differences in speaker recognition performance," in Proc. NIST Present. Int. Conf. Spoken Language Processing (IC-SLP), Nov. 1998.
-
(1998)
Proc. NIST Present. Int. Conf. Spoken Language Processing (IC-SLP)
-
-
Doddington, G.1
Liggett, W.2
Martin, A.3
Przybocki, M.4
Reynolds, D.5
-
25
-
-
0742290132
-
How iris recognition works
-
Jan.
-
J. Daugman, "How iris recognition works," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 21-30, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
26
-
-
33947411404
-
Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons
-
Nov.
-
J. Daugman, "Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons," Proc. IEEE, vol. 94, no. 11, pp. 1927-1935, Nov. 2006.
-
(2006)
Proc. IEEE
, vol.94
, Issue.11
, pp. 1927-1935
-
-
Daugman, J.1
-
27
-
-
1842499650
-
Face recognition: A literature survey
-
W. Zhao, R. Chellappa, P. Phillips, and A. Rosenfeld, "Face recognition: A literature survey," ACM Computing Surv., vol. 35, no. 4, pp. 399-458, 2003.
-
(2003)
ACM Computing Surv.
, vol.35
, Issue.4
, pp. 399-458
-
-
Zhao, W.1
Chellappa, R.2
Phillips, P.3
Rosenfeld, A.4
-
28
-
-
27844534088
-
A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition
-
DOI 10.1016/j.cviu.2005.05.005, PII S1077314205000822
-
K. Bowyer, K. Chang, and P. Flynn, "A survey of approaches and challenges in 3d and multi-modal 3d + 2d face recognition," Comput. Vis. Image Understand., vol. 101, no. 1, pp. 1-15, Jan. 2006. (Pubitemid 41642085)
-
(2006)
Computer Vision and Image Understanding
, vol.101
, Issue.1
, pp. 1-15
-
-
Bowyer, K.W.1
Chang, K.2
Flynn, P.3
-
30
-
-
0029209272
-
Robust text-independent speaker identification using gaussian mixture speaker models
-
Jan.
-
D. Reynolds and R. Rose, "Robust text-independent speaker identification using gaussian mixture speaker models," IEEE Trans. Speech Audio Processing (1993-2005), vol. 3, no. 1, pp. 72-83, Jan. 1995.
-
(1995)
IEEE Trans. Speech Audio Processing (1993-2005
, vol.3
, Issue.1
, pp. 72-83
-
-
Reynolds, D.1
Rose, R.2
-
31
-
-
85032751690
-
Gait recognition: A challening signal processing technology for biometric identification
-
DOI 10.1109/MSP.2005.1550191
-
N. Boulgouris, D. Hatzinakos, and K. N. Plat aniotis, "Gait recognition: A challenging signal processing technology for biometric identification," IEEE Signal Processing Mag., vol. 22, no. 6, pp. 78-90, 2005. (Pubitemid 46404905)
-
(2005)
IEEE Signal Processing Magazine
, vol.22
, Issue.6
, pp. 78-90
-
-
Boulgouris, N.V.1
Hatzinakos, D.2
Plataniotis, K.N.3
-
32
-
-
33947410829
-
Automatic recognition by gait
-
DOI 10.1109/JPROC.2006.886018
-
M. Nixon and J. Carter, "Automatic recognition by gait," Proc. IEEE, vol. 94, no. II, pp. 2013-2024, 2006. (Pubitemid 46453642)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.11
, pp. 2013-2024
-
-
Nixon, M.S.1
Carter, J.N.2
-
33
-
-
4644322024
-
ECG to identify individuals
-
S. Israel, J. Irvine, A. Cheng, M. Wiederhold, and B. Wiederhold, "ECG to identify individuals," Pattern Recognit., vol. 38, no. 1, pp. 133-142, 2005.
-
(2005)
Pattern Recognit.
, vol.38
, Issue.1
, pp. 133-142
-
-
Israel, S.1
Irvine, J.2
Cheng, A.3
Wiederhold, M.4
Wiederhold, B.5
-
34
-
-
77949776265
-
Securing biometric data
-
P. L. Dragotti and M. Gastpar, Eds. New York: Academic ch. 11
-
A. Vetro, S. C. Draper, S. Rane, and J. S. Yedidia, "Securing biometric data," in Distributed Source Coding, P. L. Dragotti and M. Gastpar, Eds. New York: Academic, 2009, ch. 11.
-
(2009)
Distributed Source Coding
-
-
Vetro, A.1
Draper, S.C.2
Rane, S.3
Yedidia, J.S.4
-
35
-
-
0032675768
-
Fingercode: A filterbank for fingerprint representation and matching
-
Fort Collins, CO, June
-
A. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Fingercode: A filterbank for fingerprint representation and matching," in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition (CVPR), Fort Collins, CO, June 1999, vol. 2.
-
(1999)
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition (CVPR)
, vol.2
-
-
Jain, A.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
36
-
-
69749099895
-
Fingerprint verification using spectral minutiae representations
-
H. Xu, R. Veldhuis, A. Bazen, T. Kevenaar, T. Akkermans, and B. Gokberk, "Fingerprint verification using spectral minutiae representations," IEEE Trans. Inform. Forensics Sec., vol. 4, no. 3, pp. 397-409, 2009.
-
(2009)
IEEE Trans. Inform. Forensics Sec.
, vol.4
, Issue.3
, pp. 397-409
-
-
Xu, H.1
Veldhuis, R.2
Bazen, A.3
Kevenaar, T.4
Akkermans, T.5
Gokberk, B.6
-
37
-
-
78650403067
-
Binary feature vector fingerprint representation from minutiae vicinities
-
Washington, DC, Sept.
-
J. Bringer and V. Despiegel, "Binary feature vector fingerprint representation from minutiae vicinities," in Proc. IEEE Int. Conf. Biometrics: Theory, Applications and Systems (BTAS), Washington, DC, Sept. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Int. Conf. Biometrics: Theory, Applications and Systems (BTAS)
, pp. 1-6
-
-
Bringer, J.1
Despiegel, V.2
-
38
-
-
78049382207
-
Privacy and security of features extracted from minutiae aggregates
-
Dallas, TX, Mar.
-
A. Nagar, S. Rane, and A. Vetro, "Privacy and security of features extracted from minutiae aggregates," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP), Dallas, TX, Mar. 2010.
-
(2010)
Proc. Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP)
-
-
Nagar, A.1
Rane, S.2
Vetro, A.3
-
39
-
-
33644816032
-
Performance evaluation of fingerprint verification systems
-
R. Cappelli, D. Maio, D. Maltoni, J. Wayman, and A. Jain, "Performance evaluation of fingerprint verification systems," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 1, pp. 3-18, 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.1
, pp. 3-18
-
-
Cappelli, R.1
Maio, D.2
Maltoni, D.3
Wayman, J.4
Jain, A.5
-
40
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
New York: Spr in ger-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in EUROCRYPT (LNCS, vol. 3027). New York: Spr in ger-Verlag, 2004, pp. 523-540.
-
(2004)
EUROCRYPT (LNCS, 3027)
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
41
-
-
0015648934
-
Noiseless coding of correlated information sources
-
July
-
D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, vol. IT-19, no. 4, pp. 471-480, July 1973.
-
(1973)
IEEE Trans. Inform. Theory
, vol.IT-19
, Issue.4
, pp. 471-480
-
-
Slepian, D.1
Wolf, J.K.2
-
42
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen and G. Wor nell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, 2001. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
43
-
-
77249113280
-
Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption applications
-
F. Bui, K. Martin, H. Lu, K. Plataniotis, and D. Hatzinakos, "Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption applications," IEEE Trans. Inform. Forensics Sec., vol. 5, no. 1, pp. 118-132, 2010.
-
(2010)
IEEE Trans. Inform. Forensics Sec.
, vol.5
, Issue.1
, pp. 118-132
-
-
Bui, F.1
Martin, K.2
Lu, H.3
Plataniotis, K.4
Hatzinakos, D.5
-
44
-
-
84937740421
-
Shift-register synthesis and bch decoding
-
J. Massey, "Shift-register synthesis and bch decoding," IEEE Trans. Inform. Theory, vol. 15, no. 1, pp. 122-127, 1969.
-
(1969)
IEEE Trans. Inform. Theory
, vol.15
, Issue.1
, pp. 122-127
-
-
Massey, J.1
-
45
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
New York: Springer-Verlag
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT (LNCS, vol. 1592). New York: Springer-Verlag, 1999, pp. 233-238.
-
(1999)
Advances in Cryptology-EUROCRYPT (LNCS, 1592)
, pp. 233-238
-
-
Paillier, P.1
-
46
-
-
38149070898
-
An application of the Goldwasser-Micali cryptosystem to biometric authentication
-
Townsville, Australia, July
-
J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Ta ng, and S. Zimmer, "An application of the Goldwasser-Micali cryptosystem to biometric authentication," in Proc. Aust. Conf. Information Security and Privacy, Townsville, Australia, July 2007, pp. 96-106.
-
(2007)
Proc. Aust. Conf. Information Security and Privacy
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachène, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
47
-
-
85032752211
-
Privacy-preserving nearest neighbor methods
-
Mar.
-
S. Rane and P. Boufounos, "Privacy-preserving nearest neighbor methods," IEEE Signal Processing Mag., vol. 30, no. 2, pp. 18-28, Mar. 2013.
-
(2013)
IEEE Signal Processing Mag.
, vol.30
, Issue.2
, pp. 18-28
-
-
Rane, S.1
Boufounos, P.2
-
48
-
-
85032751121
-
Encrypted signal processing for privacy protection
-
Jan.
-
I. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Processing Mag., vol. 30, no. 1, pp. 82-105, Jan. 2013.
-
(2013)
IEEE Signal Processing Mag.
, vol.30
, Issue.1
, pp. 82-105
-
-
Lagendijk, I.1
Erkin, Z.2
Barni, M.3
-
49
-
-
84944878354
-
-
Boca Raton FL: CRC Press
-
A. Menezes, P. van Oorshot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1996, 816 pp.
-
(1996)
Handbook of Applied Cryptography
, pp. 816
-
-
Menezes, A.1
Van Oorshot, P.2
Vanstone, S.3
-
50
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
51
-
-
33646095185
-
An analysis of biohash-ing and its variants
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of biohash-ing and its variants," Pattern Recognit., vol. 39, no. 7, pp. 1359-1368, 2006.
-
(2006)
Pattern Recognit.
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
52
-
-
33747604157
-
Remarks on BioHash and its mathematical foundation
-
DOI 10.1016/j.ipl.2006.06.010, PII S0020019006002080
-
A. Teoh, T. Connie, and D. Ngo, "Remarks on BioHash and its mathematical foundation," Inform. Process. Lett., vol. 100, pp. 145-150, 2006. (Pubitemid 44262353)
-
(2006)
Information Processing Letters
, vol.100
, Issue.4
, pp. 145-150
-
-
Teoh, A.1
Jin, B.2
Connie, T.3
Ngo, D.4
Ling, C.5
-
53
-
-
70449640064
-
Privacy weakness in biometric sketches
-
Oakland, CA
-
K. Simoens, P. Tuyls, and B. Preneel, "Privacy weakness in biometric sketches," in Proc. 2009 IEEE Symp. Security and Privacy, SP '09, Oakland, CA, pp. 189-203.
-
Proc. 2009 IEEE Symp. Security and Privacy, SP '09
, pp. 189-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
54
-
-
84866776956
-
Criteria towards metrics for benchmarking template protection algorithms
-
New Delhi, India, Mar.
-
K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E. Newton, and B. Preneel, "Criteria towards metrics for benchmarking template protection algorithms," in Proc. IAPR Int. Conf. Biometrics (ICB), New Delhi, India, Mar. 2012, pp. 498-505.
-
(2012)
Proc. IAPR Int. Conf. Biometrics (ICB)
, pp. 498-505
-
-
Simoens, K.1
Yang, B.2
Zhou, X.3
Beato, F.4
Busch, C.5
Newton, E.6
Preneel, B.7
-
56
-
-
33744779400
-
Biometrics: A tool for information security
-
DOI 10.1109/TIFS.2006.873653
-
A. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for information security," IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 125-143, 2006. (Pubitemid 43824625)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
57
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
M a r.
-
C. Gentry, "Computing arbitrary functions of encrypted data," Commun. ACM, vol. 53, no. 3, pp. 97-105, M a r. 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
58
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Berlin, Heidelberg, Germany: Springer-Verlag
-
M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," Advances in Cryptology-EUROCRYPT (LNCS, vol. 6110). Berlin, Heidelberg, Germany: Springer-Verlag, 2010, pp. 24-43.
-
(2010)
Advances in Cryptology-EUROCRYPT (LNCS, 6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
59
-
-
84862081075
-
Biometric-rich gestures: A novel approach to authentication on multi-touch devices
-
Austin, TX, May
-
N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, "Biometric-rich gestures: A novel approach to authentication on multi-touch devices," in Proc. ACM Conf. Human Factors Computing Systems, Austin, TX, May 2012, pp. 977-986.
-
(2012)
Proc. ACM Conf. Human Factors Computing Systems
, pp. 977-986
-
-
Sae-Bae, N.1
Ahmed, K.2
Isbister, K.3
Memon, N.4
-
60
-
-
84868222097
-
Towards gesture-based user authentication
-
Beijing, China, Sept.
-
K. Lai, J. Konrad, and P. Ishwar, "Towards gesture-based user authentication," in Proc. IEEE Advanced Video and Signal-Based Surveillance (AVSS), Beijing, China, Sept. 2012, pp. 282-287.
-
Proc. IEEE Advanced Video and Signal-Based Surveillance (AVSS)
, vol.2012
, pp. 282-287
-
-
Lai, K.1
Konrad, J.2
Ishwar, P.3
-
61
-
-
80051608657
-
Fast physical object identification based on unclonable features and soft fingerprinting
-
Prague, Czech Republic, May 2011
-
T. Holotyak, S. Voloshynovskiy, O. Koval, and F. Beekhof, "Fast physical object identification based on unclonable features and soft fingerprinting," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, May 2011, pp. 1713-1716.
-
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1713-1716
-
-
Holotyak, T.1
Voloshynovskiy, S.2
Koval, O.3
Beekhof, F.4
-
62
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
DOI 10.1109/DAC.2007.375043, 4261134, 2007 44th ACM/IEEE Design Automation Conference, DAC'07
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. ACM Design Automation Conf., San Diego, CA, June 2007, pp. 9-14. (Pubitemid 47129916)
-
(2007)
Proceedings - Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
63
-
-
84875580841
-
Information-theoretic security analysis of physical uncloneable functions
-
Roseau, Dominica, Feb.
-
P. Tuyls, B. koric, S. Stallinga, A. Akkermans, and W. Ophey, "Information-theoretic security analysis of physical uncloneable functions," in Proc. Financial Cryptography and Data Security, Roseau, Dominica, Feb. 2005, p. 578.
-
(2005)
Proc. Financial Cryptography and Data Security
, pp. 578
-
-
Tuyls, P.1
Koric, B.2
Stallinga, S.3
Akkermans, A.4
Ophey, W.5
-
64
-
-
84872354078
-
Robust key extraction from physical unclone-able functions
-
June
-
B. koric, P. Tuyls, and W. Ophey, "Robust key extraction from physical unclone-able functions," in Proc. Applied Cryptography and Network Security, New York, June 2005, pp. 99-135.
-
(2005)
Proc. Applied Cryptography and Network Security, New York
, pp. 99-135
-
-
Koric, B.1
Tuyls, P.2
Ophey, W.3
|