A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, R Ostrovsky, L Reyzin, A Smith - SIAM journal on computing, 2008 - SIAM
We provide formal definitions and efficient secure techniques for turning noisy information
into keys usable for any cryptographic application, and, in particular, reliably and securely …

Wireless device identification with radiometric signatures

V Brik, S Banerjee, M Gruteser, S Oh - Proceedings of the 14th ACM …, 2008 - dl.acm.org
We design, implement, and evaluate a technique to identify the source network interface
card (NIC) of an IEEE 802.11 frame through passive radio-frequency analysis. This …

[图书][B] Handbook of pattern recognition and computer vision

CH Chen - 2015 - books.google.com
Pattern recognition, image processing and computer vision are closely linked areas which
have seen enormous progress in the last fifty years. Their applications in our daily life …

[PDF][PDF] AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.

S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi - NDSS, 2014 - Citeseer
As mobile begins to overtake the fixed Internet access, ad networks have aggressively
sought methods to track users on their mobile devices. While existing countermeasures and …

Identifying ecus using inimitable characteristics of signals in controller area networks

W Choi, HJ Jo, S Woo, JY Chun… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As the functions of vehicles are more computerized for the safety and convenience of
drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have …

RFID-tags for anti-counterfeiting

P Tuyls, L Batina - Cryptographers' track at the RSA conference, 2006 - Springer
RFID-tags are becoming very popular tools for identification of products. As they have a
small microchip on board, they offer functionality that can be used for security purposes. This …

Scifi-a system for secure face identification

M Osadchy, B Pinkas, A Jarrous… - 2010 IEEE Symposium …, 2010 - ieeexplore.ieee.org
We introduce SCiFI, a system for Secure Computation of Face Identification. The system
performs face identification which compares faces of subjects with a database of registered …

Cracking fuzzy vaults and biometric encryption

WJ Scheirer, TE Boult - 2007 Biometrics Symposium, 2007 - ieeexplore.ieee.org
This paper is a security analysis of leading privacy enhanced technologies (PETs) for
biometrics including biometric fuzzy vaults (BFV) and biometric encryption (BE). The lack of …