The following pages link to A fuzzy vault scheme (Q2491270):
Displaying 17 items.
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy (Q335718) (← links)
- Extracting biometric binary strings with minimal area under the FRR curve for the Hamming distance classifier (Q551627) (← links)
- Key masking using biometry (Q764394) (← links)
- Enhance fuzzy vault security using nonrandom chaff point generator (Q888962) (← links)
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption (Q1791666) (← links)
- Binding cryptographic keys into biometric data: optimization (Q1995355) (← links)
- Simple multi-party set reconciliation (Q2075624) (← links)
- Computational fuzzy extractors (Q2216116) (← links)
- Leakage-resilient biometric-based remote user authentication with fuzzy extractors (Q2304568) (← links)
- A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion (Q2318177) (← links)
- Cancellable biometrics and annotations on biohash (Q2476968) (← links)
- A fuzzy vault scheme (Q2491270) (← links)
- Current Challenges for IT Security with Focus on Biometry (Q2790446) (← links)
- Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks (Q2807195) (← links)
- Authentication in Constrained Settings (Q2947097) (← links)
- A Practical Fuzzy Extractor for Continuous Features (Q2953819) (← links)
- Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation (Q6070448) (← links)