Capacity and Examples of Template-Protecting Biometric Authentication Systems
暂无分享,去创建一个
[1] J J Mulvihill,et al. The genesis of dermatoglyphics. , 1969, The Journal of pediatrics.
[2] L. Penrose,et al. Dermatoglyphic Topology , 1965, Nature.
[3] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[4] Rudolf Ahlswede,et al. Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.
[5] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[6] Ton Kalker,et al. On the capacity of a biometrical identification system , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[7] Babler Wj. Embryologic development of epidermal ridges and their configurations. , 1991 .
[8] Natalia A. Schmid,et al. Large deviations performance analysis for biomet-rics recognition , 2002 .
[9] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[10] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[11] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[12] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[13] Charles H. Bennett,et al. Quantum cryptography: uncertainty in the service of privacy. , 1992, Science.
[14] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[15] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[16] Ton van der Putte,et al. Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.
[17] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[18] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[19] Chris J. Hill,et al. Risk of Masquerade Arising from the Storage of Biometrics , 2001 .