A Fuzzy Vault Scheme
Top Cited Papers
- 1 February 2006
- journal article
- Published by Springer Science and Business Media LLC in Designs, Codes and Cryptography
- Vol. 38 (2), 237-257
- https://doi.org/10.1007/s10623-005-6343-z
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Hardness of approximating the minimum distance of a linear codePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Improved decoding of Reed-Solomon and algebraic-geometric codesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On enabling secure applications through off-line biometric identificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Noisy Polynomial Interpolation and Noisy Chinese RemainderingLecture Notes in Computer Science, 2000
- Provably Secure Password-Authenticated Key Exchange Using Diffie-HellmanLecture Notes in Computer Science, 2000
- Protecting secret keys with personal entropyFuture Generation Computer Systems, 2000
- Efficient Cryptographic Protocols Based on Noisy ChannelsLecture Notes in Computer Science, 1997
- Proving Without Knowing: On Oblivious, Agnostic and Blindfolded ProversLecture Notes in Computer Science, 1996
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Achieving oblivious transfer using weakened security assumptionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988