Short Group Signatures, Lecture Notes in Computer Science, vol.3152, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Group signatures with verifier-local revocation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.168-177, 2004. ,
DOI : 10.1145/1030083.1030106
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.8033
Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004. ,
DOI : 10.1145/1030083.1030096
URL : http://ai.stanford.edu/~xb/ccs04/fuzzysecure.pdf
Secure Remote Authentication Using Biometric Data, Advances in Cryptology ? EUROCRYPT 2005, pp.147-163, 2005. ,
DOI : 10.1007/11426639_9
URL : http://ai.stanford.edu/~xb/eurocrypt05b/fuzzy-full.ps
Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006. ,
DOI : 10.1145/1180405.1180427
Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007. ,
DOI : 10.1109/BTAS.2007.4401904
URL : https://hal.archives-ouvertes.fr/hal-00270547
Approximate Message Authentication and Biometric Entity Authentication, Financial Cryptography and Data Security, 9th International Conference, pp.240-254, 2005. ,
DOI : 10.1007/11507840_22
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, Advances in Cryptology ? CRYPTO 2006, pp.232-250, 2006. ,
DOI : 10.1007/11818175_14
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Advances in Cryptology ? EU- ROCRYPT 2004, pp.523-540, 2004. ,
DOI : 10.1137/060651380
A fuzzy vault scheme. Design Codes and Cryptography, pp.237-257, 2006. ,
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, 4th International Conference, pp.393-402, 2003. ,
DOI : 10.1007/3-540-44887-X_47
Iris Recognition and Verification Experiments with Improved Segmentation Method, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), pp.17-18, 2005. ,
Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, vol.2, issue.4, 2008. ,
DOI : 10.1109/TIFS.2007.908165
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.4945
Practical Biometric Authentication with Template Protection ,
DOI : 10.1007/11527923_45
Audio-and Video-Based Biometric Person Authentication, 5th International Conference, pp.436-446, 2005. ,
Capacity and Examples of Template-Protecting Biometric Authentication Systems, ECCV Workshop BioAW, pp.158-170, 2004. ,
DOI : 10.1007/978-3-540-25976-3_15
Privacy protecting biometric authentication systems: an overview, 2004. ,