False-Accept/False-Reject Trade-Offs for Ensembles of Biometric Authentication Systems
暂无分享,去创建一个
[1] Neri Merhav. Ensemble Performance of Biometric Authentication Systems Based on Secret Key Generation , 2019, IEEE Trans. Inf. Theory.
[2] Jun Chen,et al. On the Reliability Function of Variable-Rate Slepian-Wolf Coding , 2017, Entropy.
[3] Neri Merhav,et al. Optimum Tradeoffs Between the Error Exponent and the Excess-Rate Exponent of Variable-Rate Slepian–Wolf Coding , 2015, IEEE Transactions on Information Theory.
[4] H. Vincent Poor,et al. The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.
[5] Frans M. J. Willems,et al. Biometric Security from an Information-Theoretical Perspective , 2012, Found. Trends Commun. Inf. Theory.
[6] Masahide Sasaki,et al. Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint , 2013, IEEE Transactions on Information Theory.
[7] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[8] H.V. Poor,et al. Privacy-security tradeoffs in biometric security systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[9] Neri Merhav. The Generalized Stochastic Likelihood Decoder: Random Coding and Expurgated Bounds , 2017, IEEE Trans. Inf. Theory.
[10] Frans M. J. Willems,et al. Authentication based on secret-key generation , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[11] Neri Merhav,et al. A large deviations approach to secure lossy compression , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).
[12] Vincent Y. F. Tan,et al. The Sender-Excited Secret Key Agreement Model: Capacity, Reliability, and Secrecy Exponents , 2011, IEEE Transactions on Information Theory.
[13] Albert Guillén i Fàbregas,et al. The likelihood decoder: Error exponents and mismatch , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[14] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[15] M. Maurer,et al. Secret Key Agreement by Public Discussion from Common Information , 2004 .
[16] Imre Csiszár,et al. Graph decomposition: A new key to coding theorems , 1981, IEEE Trans. Inf. Theory.
[17] Rudolf Ahlswede,et al. Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.