共 53 条
- [31] Simoens K., Tuyls P., Preneel B., Privacy weaknesses in biometric sketches, Proceedings of the 2009 IEEE Symposium on Security and Privacy, (2009)
- [32] Chang E.-C., Roy S., Robust extraction of secret bits from minutiae, Proceedings of International Conference on Biometrics, pp. 750-759, (2007)
- [33] Skoric B., De Vreede N., The spammed code offset method, IEEE Trans Inf Forensics Sec, 9, 5, pp. 875-884, (2014)
- [34] Juels A., Wattenberg M., A fuzzy commitment scheme, Proceedings of the 6Th ACM Conference on Computer and Communications Security, pp. 28-36, (1999)
- [35] Hao F., Anderson R., Daugman J., Combining crypto with biometrics effectively, IEEE Trans Comput, 55, 9, pp. 1081-1088, (2006)
- [36] Rathgeb C., Uhl A., Adaptive fuzzy commitment scheme based on iris-code error analysis, Proceedings of the 2Nd European Workshop on Visual Information Processing (EUVIP’10), pp. 41-44, (2010)
- [37] Juels A., Sudan M (2002) A fuzzy vault scheme, Proceedings of the IEEE International Symposium on Information Theory (IS1T, (2002)
- [38] Juels A., Sudan M., A fuzzy vault scheme, Des Codes Crypt, 38, 2, pp. 237-257, (2006)
- [39] Uludag U., Pankanti S., Jain A.K., Fuzzy vault for fingerprint, Proceedings of Audio-And Video-Based Biometric Person Authentication (AVBPA 2005), LNCS, 3546, pp. 310-319, (2005)
- [40] Nandakumar K., Jain A.K., Pankanti S., Fingerprint-based fuzzy vault: Implementation and performance, IEEE Trans Inf Forensics Sec, 2, 4, pp. 744-757, (2007)