Network Security Using Biometric and Cryptography
- 1 January 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- A Framework for Design and Analysis of Asymmetric Fingerprinting ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Active Biometric Cryptography (ABC): Key Generation Using Feature and Parametric AggregationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True AnonymityLecture Notes in Computer Science, 2004
- A fuzzy vault schemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric TemplatesLecture Notes in Computer Science, 2003
- An Anonymous Buyer-Seller Watermarking Protocol with Anonymity ControlLecture Notes in Computer Science, 2003
- Secure smartcardbased fingerprint authenticationPublished by Association for Computing Machinery (ACM) ,2003
- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third PartyLecture Notes in Computer Science, 2003
- Cryptographic key generation from voicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A fuzzy commitment schemePublished by Association for Computing Machinery (ACM) ,1999