Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault
暂无分享,去创建一个
[1] James H. Burrows,et al. Secure Hash Standard , 1995 .
[2] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[5] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[6] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] Mohammed Yakoob Siyal,et al. Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..
[8] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[9] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[10] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[11] Oded Goldreich,et al. Cryptography and Computer Security , 2003 .
[12] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[13] David Zhang,et al. Competitive coding scheme for palmprint verification , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[14] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[15] Chu-Hsing Lin,et al. A flexible biometrics remote user authentication scheme , 2004, Comput. Stand. Interfaces.
[16] Anil K. Jain,et al. Fuzzy Fingerprint Vault , 2004 .
[17] David Zhang,et al. Competitive coding scheme for palmprint verification , 2004, ICPR 2004.
[18] Anil K. Jain,et al. Audio- and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings (Lecture Notes in Computer Science) , 2005 .
[19] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[20] Henry Ng. Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) , 2005, IACR Cryptol. ePrint Arch..
[21] Kyung-Hyun Choi,et al. Optical security system for the protection of personal identification information. , 2005, Applied optics.
[22] David Zhang,et al. Biometric Recognition Using Feature Selection and Combination , 2005, AVBPA.
[23] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[24] David Zhang,et al. Personal authentication using multiple palmprint representation , 2005, Pattern Recognit..
[25] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[26] Santanu Chaudhury,et al. Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[27] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[28] Helen C. Shen,et al. Personal authentication using hand images , 2006, Pattern Recognit. Lett..
[29] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[30] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[31] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[32] David Zhang,et al. A Palmprint Cryptosystem , 2007, ICB.
[33] Dongho Won,et al. Security weakness in a three-party pairing-based protocol for password authenticated key exchange , 2007, Inf. Sci..
[34] Zhengjun Liu,et al. Double image encryption based on iterative fractional Fourier transform , 2007 .
[35] Ajay Kumar,et al. Incorporating Cohort Information for Reliable Palmprint Authentication , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[36] David Zhang,et al. Three measures for secure palmprint identification , 2008, Pattern Recognit..
[37] Ajay Kumar,et al. A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.
[38] Ron,et al. The RSA Algorithm , 2009 .
[39] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.