Cryptographically secure biometrics
暂无分享,去创建一个
[1] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[2] Berry Schoenmakers,et al. Computationally Secure Authentication with Noisy Data , 2007 .
[3] Ee-Chien Chang,et al. Finding the original point set hidden among chaff , 2006, ASIACCS '06.
[4] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[5] Pieter H. Hartel,et al. Controlling leakage of biometric information using dithering , 2008, 2008 16th European Signal Processing Conference.
[6] Stuart S. Shapiro,et al. Privacy by design , 2010, Commun. ACM.
[7] K. Srinathan,et al. Efficient Biometric Verification in Encrypted Domain , 2009, ICB.
[8] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[9] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[10] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[11] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[12] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[13] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[14] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[15] A. Stoianov,et al. Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[16] Haiping Lu,et al. A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition , 2009, IEEE Systems Journal.
[17] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[18] Julien Bringer,et al. Biometric Identification over Encrypted Data Made Feasible , 2009, ICISS.
[19] Konstantinos N. Plataniotis,et al. Biometric Encryption: The New Breed of Untraceable Biometrics , 2010 .
[20] Julien Bringer,et al. An Authentication Protocol with Encrypted Biometric Data , 2008, AFRICACRYPT.
[21] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[23] Qiang Tang,et al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.
[24] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..