Systematic Construction of Iris-Based Fuzzy Commitment Schemes
暂无分享,去创建一个
[1] E. Berlekamp. Factoring polynomials over finite fields , 1967 .
[2] S. Agaian. Hadamard Matrices and Their Applications , 1985 .
[3] Lajos Rónyai,et al. Factoring polynomials over finite fields , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[4] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[5] Bhagavatula Vijaya Kumar,et al. Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.
[6] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[7] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[8] Yair Frankel,et al. On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .
[9] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[10] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] Michael K. Reiter,et al. Cryptographic Key Generation from Voice (Extended Abstract) , 2001 .
[12] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[13] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[14] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[15] Dexin Zhang,et al. Efficient iris recognition by characterizing key local variations , 2004, IEEE Transactions on Image Processing.
[16] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[17] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[18] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[19] Kyoil Chung,et al. A Novel and Efficient Feature Extraction Method for Iris Recognition , 2007 .
[20] David Zhang,et al. A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.
[21] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[22] Patrick J. Flynn,et al. Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..