Fuzzy extractors for continuous distributions
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[2] Tsuhan Chen,et al. Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[3] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[4] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[5] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[6] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[7] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[8] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Tsuhan Chen,et al. Optimal thresholding for key generation based on biometrics , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[10] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.