Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics
暂无分享,去创建一个
[1] David Zhang,et al. A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.
[2] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Christoforos N. Hadjicostis,et al. Decoding algorithm and architecture for BCH codes under the Lee Metric , 2008, IEEE Transactions on Communications.
[4] Moni Naor,et al. From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract) , 1998, CRYPTO.
[5] Ivan Damgård,et al. Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..
[6] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[7] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[8] C. Y. Lee,et al. Some properties of nonbinary error-correcting codes , 1958, IRE Trans. Inf. Theory.
[9] Ron M. Roth,et al. Introduction to Coding Theory , 2019, Discrete Mathematics.
[10] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[11] J. Fierrez-Aguilar,et al. Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.
[12] Bon K. Sy,et al. Generation of Cryptographic Keys from Personal Biometrics: An Illustration Based on Fingerprints , 2012 .
[13] Michael K. Reiter,et al. The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.
[14] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[15] A. Uhl,et al. An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[16] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[17] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[18] Shuguo Han,et al. Privacy-Preserving Linear Fisher Discriminant Analysis , 2008, PAKDD.
[19] Ivan Damgård,et al. A correction to 'efficient and secure comparison for on-line auctions' , 2009, Int. J. Appl. Cryptogr..
[20] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[21] Andreas Uhl,et al. Privacy Preserving Key Generation for Iris Biometrics , 2010, Communications and Multimedia Security.
[22] Dirk Scheuermann,et al. On biometric key generation from handwritten signatures , 2011, BIOSIG.
[23] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..