Efficient Privacy-Preserving Biometric Identification
暂无分享,去创建一个
Jonathan Katz | Yan Huang | David Evans | Lior Malka | Jonathan Katz | David Evans | Yan Huang | Lior Malka
[1] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[2] S. H. Gerez,et al. A correlation-based fingerprint verification system , 2000 .
[3] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[5] Moni Naor,et al. Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Sabih H. Gerez,et al. Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Anil K. Jain,et al. Decision-Level Fusion in Fingerprint Verification , 2001, Multiple Classifier Systems.
[9] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[10] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[11] Arun Ross,et al. A hybrid fingerprint matcher , 2002, Object recognition supported by user interaction for service robots.
[12] Raymond N. J. Veldhuis,et al. Fingerprint Verification Using Spectral Minutiae Representations , 2009, IEEE Transactions on Information Forensics and Security.
[13] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[14] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[15] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[16] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[17] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[18] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[19] Ahmad-Reza Sadeghi,et al. Practical Secure Evaluation of Semi-Private Functions , 2009, IACR Cryptol. ePrint Arch..
[20] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[21] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[22] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[23] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.