Privacy and Identity Management for the Future Internet in the Age of Globalisation
暂无分享,去创建一个
Jan Camenisch | Simone Fischer-Hübner | Marit Hansen | J. Camenisch | M. Hansen | S. Fischer-Hübner | Simone Fischer-Hübner | Marit Hansen
[1] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[2] Fatbardh Veseli,et al. Attribute-Based Credentials for Trust D 5 . 2 Amendment Building Blocks of ABC Technology , 2013 .
[3] Nasir D. Memon,et al. Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[4] Mark J. Burge,et al. Handbook of Iris Recognition , 2013, Advances in Computer Vision and Pattern Recognition.
[5] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[6] Andreas Uhl,et al. Reliability-balanced feature level fusion for fuzzy commitment scheme , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[7] Marit Hansen,et al. Towards a privacy-preserving inspection process for authentication solutions with conditional identification , 2014, Open Identity Summit.
[8] Patrick J. Flynn,et al. Fusion of Face and Iris Biometrics , 2013, Handbook of Iris Recognition.
[9] Gaoyun An,et al. Face Template Protection Using Chaotic Encryption , 2013 .
[10] Bart Preneel,et al. Secure and Privacy-Friendly Logging for eGovernment Services , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[11] Christoph Busch,et al. Towards Electronic Identification and Trusted Services for Biometric Authenticated Transactions in the Single Euro Payments Area , 2014, APF.
[12] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[13] Mohamed Berkane,et al. Multimodal biometric systems , 2014, 2014 International Conference on Multimedia Computing and Systems (ICMCS).
[14] David Zhang,et al. Palmprint identification using feature-level fusion , 2006, Pattern Recognit..
[15] K. R. Radhika,et al. Pattern recognition techniques in on-line hand written signature verification - A survey , 2009, 2009 International Conference on Multimedia Computing and Systems.
[16] Patrizio Campisi,et al. Security and Privacy in Biometrics , 2013, Springer London.
[17] M. Rajibul Islam,et al. Multimodality to improve security and privacy in fingerprint authentication system , 2007, 2007 International Conference on Intelligent and Advanced Systems.
[18] Aboul Ella Hassanien,et al. Impact of Some Biometric Modalities on Forensic Science , 2014, Computational Intelligence in Digital Forensics.
[19] Eleni Kosta,et al. Privacy preserving electronic petitions , 2008 .
[20] Knud Böhle,et al. Elektronische Petitionssysteme : Analysen zur Modernisierung des parlamentarischen Petitionswesens in Deutschland und Europa , 2013 .
[21] C. Busch,et al. Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[22] Xuehu Yan,et al. A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system , 2015, Signal Image Video Process..
[23] Raymond N. J. Veldhuis,et al. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source , 2010, Defense + Commercial Sensing.
[24] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[25] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[26] Christoph Busch,et al. Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[27] Christoph Busch,et al. Towards standardizing trusted evidence of identity , 2013, Digital Identity Management.