Feeling Is Believing: A Secure Template Exchange Protocol
暂无分享,去创建一个
Pieter H. Hartel | Raymond N. J. Veldhuis | Jeroen Doumen | Ileana Buhan | P. Hartel | J. Doumen | R. Veldhuis | I. Buhan
[1] Serge Vaudenay,et al. Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.
[2] N. Asokan,et al. Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Frank Stajano,et al. Multi-channel protocols for group key agreement in arbitrary topologies , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[4] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[5] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[6] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] Sandro Etalle,et al. An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Thomas D. Wu. The Secure Remote Password Protocol , 1998, NDSS.
[10] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[11] John O. Pliam. Guesswork and Variation Distance as Measures of Cipher Security , 1999, Selected Areas in Cryptography.
[12] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[13] Michael Sirivianos,et al. Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[14] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[15] Pieter H. Hartel,et al. Biometric verification based on grip-pattern recognition , 2004, IS&T/SPIE Electronic Imaging.