A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault
暂无分享,去创建一个
[1] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[2] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[3] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[4] Anil K. Jain. Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..
[5] Ed Dawson,et al. Shamir's Scheme Says It all , 1993, SEC.
[6] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Daesung Moon,et al. Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.
[9] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[10] Sanjeev Arora,et al. Fitting algebraic curves to noisy data , 2002, STOC '02.
[11] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[12] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[13] Colin Boyd,et al. A Multiple-Control Fuzzy Vault , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[14] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[15] Phong Q. Nguyen,et al. Noisy Polynomial Interpolation and Noisy Chinese Remaindering , 2000, EUROCRYPT.