Abstract. Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed; and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public information to be reliably sent from a server to the human user. Subsequent work of Boyen has shown how to extend these techniques, in the random oracle model, to enable unidirectional authentication from the user to the server without the assumption of a reliable communication channel. We show two efficient techniques enabling the use of biometric d...
In this paper we will present some schemes for strengthening network authentification over insecure ...
We consider an authentication process that makes use of biometric data or the output of a physical u...
We consider an authentication process that makes use of biometric data or the output of a physical u...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...
The inability of humans to generate and remember strong secrets makes it difficult for humans to man...
In this paper we analyze two types of biometric identification systems with protected templates that...
In this paper we analyze two types of biometric identification systems with protected templates that...
In this paper we will present some schemes for strengthening network authentification over insecure ...
Robust biometric authentication is studied from an information theoretic perspective. Compound sourc...
In this paper, we propose two novel biometrics-based secure key agreement protocols, namely Secure K...
A range of issues arises in biometric authentication primarily concerning protection of biometric da...
Robust biometric authentication is studied from an information theoretic perspective. Compound sourc...
Abstract. In this paper we will present some schemes for strengthening network authentification over...
The inability of humans to generate and remember strong secrets makes it difficult for people to man...
Abstract We introduce a new way for generating strong keys from biometric data. Contrary to popular ...
In this paper we will present some schemes for strengthening network authentification over insecure ...
We consider an authentication process that makes use of biometric data or the output of a physical u...
We consider an authentication process that makes use of biometric data or the output of a physical u...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...
The inability of humans to generate and remember strong secrets makes it difficult for humans to man...
In this paper we analyze two types of biometric identification systems with protected templates that...
In this paper we analyze two types of biometric identification systems with protected templates that...
In this paper we will present some schemes for strengthening network authentification over insecure ...
Robust biometric authentication is studied from an information theoretic perspective. Compound sourc...
In this paper, we propose two novel biometrics-based secure key agreement protocols, namely Secure K...
A range of issues arises in biometric authentication primarily concerning protection of biometric da...
Robust biometric authentication is studied from an information theoretic perspective. Compound sourc...
Abstract. In this paper we will present some schemes for strengthening network authentification over...
The inability of humans to generate and remember strong secrets makes it difficult for people to man...
Abstract We introduce a new way for generating strong keys from biometric data. Contrary to popular ...
In this paper we will present some schemes for strengthening network authentification over insecure ...
We consider an authentication process that makes use of biometric data or the output of a physical u...
We consider an authentication process that makes use of biometric data or the output of a physical u...