Password-based authenticated key exchange in the three-party setting, PKC 2005, pp.65-84, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00918401
Simple Password-Based Encrypted Key Exchange Protocols, CT-RSA 2005, pp.191-208, 2005. ,
DOI : 10.1007/978-3-540-30574-3_14
Externalized Fingerprint Matching, Biometric Authentication, First International Conference, pp.309-315, 2004. ,
DOI : 10.1007/978-3-540-25948-0_43
Modular approach to the design and analysis of key exchange protocols, 30th ACM STOC, pp.419-428, 1998. ,
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Authenticated Key Exchange Secure against Dictionary Attacks, LNCS, vol.1807, pp.139-155, 2000. ,
DOI : 10.1007/3-540-45539-6_11
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Entity Authentication and Key Distribution, CRYPTO'93, pp.232-249, 1994. ,
DOI : 10.1007/3-540-48329-2_21
Encrypted key exchange: Password-based protocols secure against dictionary attacks, IEEE Symposium on Security and Privacy, pp.72-84, 1992. ,
Generalized privacy amplification, ISIT, 1994. ,
DOI : 10.1109/isit.1994.394668
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.8666
Privacy preserving multi-factor authentication with biometrics ,
DOI : 10.3233/jcs-2007-15503
URL : http://doi.org/10.3233/jcs-2007-15503
Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004. ,
DOI : 10.1145/1030083.1030096
Secure Remote Authentication Using Biometric Data, LNCS, vol.3494, pp.147-163, 2005. ,
DOI : 10.1007/11426639_9
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, LNCS, vol.1807, pp.156-171, 2000. ,
DOI : 10.1007/3-540-45539-6_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7667
Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006. ,
DOI : 10.1145/1180405.1180427
Universally Composable Password-Based Key Exchange, LNCS, vol.3494, pp.404-421, 2005. ,
DOI : 10.1007/11426639_24
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, LNCS, vol.2045, pp.453-474, 2001. ,
DOI : 10.1007/3-540-44987-6_28
Security Analysis of IKE???s Signature-Based Key-Exchange Protocol, LNCS, vol.2442120, pp.143-161, 2002. ,
DOI : 10.1007/3-540-45708-9_10
Universally Composable Notions of Key Exchange and Secure Channels, LNCS, vol.2332, pp.337-351, 2002. ,
DOI : 10.1007/3-540-46035-7_22
How iris recognition works, pp.33-36, 2002. ,
Iris recognition and anti-spoofing countermeasures, 7-th International Biometrics Conference, 2004. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Robust fuzzy extractors and authenticated key agreement from close secrets, LNCS, vol.4117, pp.232-250, 2006. ,
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.523-540, 2004. ,
DOI : 10.1137/060651380
A public key cryptosystem and a signature scheme based on discrete logarithms, LNCS, vol.84, issue.196, pp.10-18, 1985. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
The knowledge complexity of interactive proof-systems, Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp.291-304, 1985. ,
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988. ,
DOI : 10.1137/0217017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353
Phishing and Counter-Measures, 2006. ,
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, LNCS, vol.576, issue.91, pp.433-444, 1992. ,
DOI : 10.1007/3-540-46766-1_35
Biometric Liveness Testing, chapter 8, 2002. ,