Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
暂无分享,去创建一个
[1] Wei-Kuan Shih,et al. Security enhancement on an improvement on two remote user authentication schemes using smart cards , 2011, Future Gener. Comput. Syst..
[2] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[5] William Stallings,et al. Cryptography and network security , 1998 .
[6] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[7] Kenneth Stephenson,et al. A circle packing algorithm , 2003, Comput. Geom..
[8] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[9] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[11] Ronald L. Graham,et al. Repeated Patterns of Dense Packings of Equal Disks in a Square , 1996, Electron. J. Comb..
[12] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[13] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[14] Ed Dawson,et al. Key management in a non-trusted distributed environment , 2000, Future Gener. Comput. Syst..
[15] Hatim Aboalsamh. A Multi Biometric System Using Combined Vein and Fingerprint Identification , 2010 .
[16] G. Bioul,et al. Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems , 2006 .
[17] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[18] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[19] Richard E. Smith,et al. Authentication: From Passwords to Public Keys , 2001 .
[20] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[21] Parvathi Ambalakat. Security of Biometric Authentication Systems , 2005 .
[22] Václav Matyás,et al. Security of biometric authentication systems , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).
[23] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[24] Ee-Chien Chang,et al. Finding the original point set hidden among chaff , 2006, ASIACCS '06.