Author:
Bringer Julien,Chabanne Hervé,Kevenaar Tom A. M.,Kindarji Bruno
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.P.: Cryptographic processors-a survey. Proceedings of the IEEE 94(2), 357–369 (2006)
2. Lecture Notes in Computer Science;X. Boyen,2005
3. Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G.: Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 3(4), 673–683 (2008)
4. Chen, C., Veldhuis, R.N.J., Kevenaar, T.A.M., Akkermans, A.H.M.: Biometric binary string generation with detection rate optimized bit allocation. In: IEEE CVPR 2008, Workshop on Biometrics, June 2008, pp. 1–7 (2008)
5. Chen, C., Veldhuis, R.N.J.: Performances of the likelihood-ratio classifier based on different data modelings. In: ICARCV, pp. 1347–1351. IEEE, Los Alamitos (2008)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献