The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits
暂无分享,去创建一个
Young-Sik Jeong | Jae-Khun Chang | Heuiseok Lim | Sung-Hyun Yun | Soonyoung Jung | Y. Jeong | Heuiseok Lim | Jae-Khun Chang | Sung-Hyun Yun | Soonyoung Jung
[1] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometrics , 2005 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Shuchi Nagpal,et al. Biometric based Digital Signature scheme , 2002 .
[4] Ahmad-Reza Sadeghi,et al. Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.
[5] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[6] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[7] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Ahmad-Reza Sadeghi,et al. Proving Ownership of Digital Content , 1999, Information Hiding.
[9] J. G. Daugman. High confidence personal identification by rapid video analysis of iris texture , 1992, Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures.
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[12] Carlos D. Castillo,et al. Fuzzy Vault , 2009, Encyclopedia of Biometrics.
[13] Wenjun Zeng,et al. Multimedia Security Technologies for Digital Rights Management , 2006 .
[14] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[15] Elaine B. Barker. Digital Signature Standard (DSS) | NIST , 1998 .
[16] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[17] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[18] Gerrit Bleumer,et al. Undeniable Signatures , 2011, Encyclopedia of Cryptography and Security.
[19] Mohammed Yakoob Siyal,et al. Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..
[20] L. Harn. Group-oriented (t, n) threshold digital signature scheme and digital multisignature , 1994 .
[21] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[22] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..