-
1
-
-
0000562870
-
Inside risks: The uses and abuses of biometrics
-
B. Scheier, Inside risks: the uses and abuses of biometrics, Comm. ACM 42 (1999) 136.
-
(1999)
Comm. ACM
, vol.42
, pp. 136
-
-
Scheier, B.1
-
2
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N.K. Ratha, J. Connell, R. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Syst J. 40 (2001) 614-634.
-
(2001)
IBM Syst J.
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.2
Bolle, R.3
-
3
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in: Proceedings Symposium on Privacy and Security, 1998, pp. 148-157.
-
(1998)
Proceedings Symposium on Privacy and Security
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.J.3
-
4
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth, E. Teletar (Eds.), Lausanne, Switzerland
-
A. Juels, M. Sudan, A fuzzy vault scheme, in: A. Lapidoth, E. Teletar (Eds.), Proceedings of the 2002 IEEE International Symposium on Information Theory, Lausanne, Switzerland, 2002, p. 408.
-
(2002)
Proceedings of the 2002 IEEE International Symposium on Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
5
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
J. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. Pattern Anal. Mach. Intell. 15 (1993) 1148-1161.
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.15
, pp. 1148-1161
-
-
Daugman, J.1
-
6
-
-
8344236959
-
Biometric encryption
-
R.K. Nichols (Ed.), McGraw-Hill, New York
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V.K. Vijaya Kumar. Biometric encryption, in: R.K. Nichols (Ed.), ICSA Guide to Cryptography, McGraw-Hill, New York, 1999, pp. 649-675.
-
(1999)
ICSA Guide to Cryptography
, pp. 649-675
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
7
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
F. Monrose, M.K. Reiter, S. Wetzel, Password hardening based on keystroke dynamics, in: Proc. 6th ACM Conf. on Computer and Communications Security, 1999, pp. 73-82.
-
(1999)
Proc. 6th ACM Conf. on Computer and Communications Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
8
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
Springer-Verlag, Berlin
-
A. Goh, C.L. David Ngo, Computation of cryptographic keys from face biometrics, in: Lecture Notes in Computer Science, vol. 2828, Springer-Verlag, Berlin, 2003, pp. 1-13.
-
(2003)
Lecture Notes in Computer Science
, vol.2828
, pp. 1-13
-
-
Goh, A.1
David Ngo, C.L.2
-
9
-
-
0031185845
-
Eigenfaces vs. fisherfaces: Recognition using class specific linear projection
-
P.N. Belhumeur, J.P. Hespanha, D.J. Kriegman, Eigenfaces vs. fisherfaces: recognition using class specific linear projection, IEEE Trans. Pattern Anal. Mach. Intell. 19 (7) (1997) 711-720.
-
(1997)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.19
, Issue.7
, pp. 711-720
-
-
Belhumeur, P.N.1
Hespanha, J.P.2
Kriegman, D.J.3
|