Pages that link to "Item:Q5385727"
From MaRDI portal
The following pages link to Secure Remote Authentication Using Biometric Data (Q5385727):
Displaying 20 items.
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Robustly reusable fuzzy extractor with imperfect randomness (Q831183) (← links)
- LWE without modular reduction and improved side-channel attacks against BLISS (Q1633471) (← links)
- Robustly reusable fuzzy extractor from standard assumptions (Q1710686) (← links)
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption (Q1791666) (← links)
- Reusable fuzzy extractors for low-entropy distributions (Q2032056) (← links)
- A generic construction of fuzzy signature (Q2151284) (← links)
- Computational fuzzy extractors (Q2216116) (← links)
- Leakage-resilient biometric-based remote user authentication with fuzzy extractors (Q2304568) (← links)
- Game theory analysis of biometric systems market: users choice VS service providers revenue (Q2680991) (← links)
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy (Q2697881) (← links)
- When Are Fuzzy Extractors Possible? (Q2958123) (← links)
- Condensed Unpredictability (Q3448859) (← links)
- Privacy with Imperfect Randomness (Q3457080) (← links)
- Password Mistyping in Two-Factor-Authenticated Key Exchange (Q3519545) (← links)
- An Improved Robust Fuzzy Extractor (Q3540042) (← links)
- Key Agreement from Close Secrets over Unsecured Channels (Q3627436) (← links)
- Non-Malleable Codes from Additive Combinatorics (Q4637777) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Privacy amplification with asymptotically optimal entropy loss (Q5501933) (← links)