Authentication in constrained settings
From MaRDI portal
Publication:2947097
Recommendations
Cites work
- scientific article; zbMATH DE number 2089662 (Why is no real title available?)
- scientific article; zbMATH DE number 2009963 (Why is no real title available?)
- scientific article; zbMATH DE number 1394315 (Why is no real title available?)
- scientific article; zbMATH DE number 5485574 (Why is no real title available?)
- A fuzzy vault scheme
- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
- Correction: ``Random walk in a random environment and first-passage percolation on trees
- Differentially private empirical risk minimization
- Distinguishing distributions using Chernoff information
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- On Privacy Models for RFID
- On modeling terrorist frauds. Addressing collusion in distance bounding protocols
- On the leakage of information in biometric authentication
- On the pseudorandom function assumption in (secure) distance-bounding protocols. PRF-ness alone does not stop the frauds!
- Private information retrieval
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Robust and private Bayesian inference
- Secure Biometric Authentication with Improved Accuracy
- Secure and lightweight distance-bounding
- Security with noisy data. Private biometrics, secure storage and anti-counterfeiting.
- The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks
- Theory of Cryptography
- Topics in Cryptology – CT-RSA 2006
- Towards secure distance bounding
- What can we learn privately?
This page was built for publication: Authentication in constrained settings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2947097)