Author:
Buhan Ileana,Doumen Jeroen,Hartel Pieter,Tang Qian,Veldhuis Raymond
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference31 articles.
1. Barak, B., Impagliazzo, R., Wigderson, A.: Extracting randomness using few independent sources. In: Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science (FOCS’04), vol. 45, pp. 384–393. Roma, Italy, Oct (2004)
2. Barron R.J., Chen B., Wornell G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Trans. Inf. Theory 49(5), 1159–1180 (2003)
3. Boyen, X.: Reusable cryptographic fuzzy extractors. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington DC, USA pp. 82–91. ACM, Oct (2004)
4. Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Ronald, C., (ed.) Advances in Cryptology, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005), Aarhus, Denmark volume 3494 of Lecture Notes in Computer Science, pp. 147–163. Springer, May (2005)
5. Buhan, I.R., Doumen, J., Hartel, P.H.: Controling leakage of biometric information using dithering. In: Proceedings of the 16th European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland EUSIPCO. European Association for Signal, Speech and Image Processing, EURASIP, Aug (2008)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献