Secure Biometric Authentication for Weak Computational Devices, In Financial Cryptography, pp.357-371, 2005. ,
DOI : 10.1007/11507840_32
Biometric perils and patches, Pattern Recognition, vol.35, issue.12, pp.2727-2738, 2002. ,
DOI : 10.1016/S0031-3203(01)00247-3
Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004. ,
DOI : 10.1145/1030083.1030096
Secure Remote Authentication Using Biometric Data, Advances in Cryptology -EUROCRYPT 2005, pp.147-163, 2005. ,
DOI : 10.1007/11426639_9
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Information Security and Privacy, 12th Australasian Conference, ACISP 2007 Proceedings, pp.96-106, 2007. ,
DOI : 10.1007/978-3-540-73458-1_8
Extended Private Information Retrieval and Its Application in Biometrics Authentications, To appear in Proceedings of CANS 2007, 2007. ,
DOI : 10.1007/978-3-540-76969-9_12
Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998. ,
DOI : 10.1145/293347.293350
Approximate Message Authentication and Biometric Entity Authentication, Financial Cryptography and Data Security, 9th International Conference, pp.240-254, 2005. ,
DOI : 10.1007/11507840_22
Single Database Private Information Retrieval Implies Oblivious Transfer, Advances in Cryptology -EUROCRYPT 2000, pp.122-138, 2000. ,
DOI : 10.1007/3-540-45539-6_10
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, Lecture Notes in Computer Science, vol.4117, pp.232-250, 2006. ,
DOI : 10.1007/11818175_14
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Advances in Cryptology -EUROCRYPT 2004, pp.523-540, 2004. ,
DOI : 10.1137/060651380
Secure multi-party computation problems and their applications, Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.13-22, 2001. ,
DOI : 10.1145/508171.508174
Single-Database Private Information Retrieval with Constant Communication Rate, Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, pp.803-815, 2005. ,
DOI : 10.1007/11523468_65
Protecting data privacy in private information retrieval schemes, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.151-160, 1998. ,
DOI : 10.1145/276698.276723
Combining crypto with biometrics effectively, IEEE Transactions on Computers, vol.55, issue.9, pp.1081-1088, 2006. ,
A fuzzy vault scheme, Proceedings IEEE International Symposium on Information Theory,, pp.237-257, 2006. ,
DOI : 10.1109/ISIT.2002.1023680
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, 4th International Conference, pp.393-402, 2003. ,
DOI : 10.1007/3-540-44887-X_47
Handbook of Fingerprint Recognition, 2003. ,
DOI : 10.1007/978-1-84882-254-2
A Taxonomy of Single Sign-On Systems, Information Security and Privacy, 8th Australasian Conference, pp.249-264, 2003. ,
DOI : 10.1007/3-540-45067-X_22
Cancelable Biometrics: A Case Study in Fingerprints, 18th International Conference on Pattern Recognition (ICPR'06), pp.370-373, 2006. ,
DOI : 10.1109/ICPR.2006.353
Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
DOI : 10.1147/sj.403.0614
Fuzzy universal hashing and approximate authentication. Cryptology ePrint Archive, Report, vol.256, 2005. ,
Inside risks: the uses and abuses of biometrics, Communications of the ACM, vol.42, issue.8, p.136, 1999. ,
DOI : 10.1145/310930.310988
Efficient Binary Conversion for Paillier Encrypted Values, EUROCRYPT, pp.522-537, 2006. ,
DOI : 10.1007/11761679_31
Practical Biometric Authentication with Template Protection, Audioand Video-Based Biometric Person Authentication, 5th International Conference, pp.436-446, 2005. ,
DOI : 10.1007/11527923_45
Capacity and Examples of Template-Protecting Biometric Authentication Systems, ECCV Workshop BioAW, pp.158-170, 2004. ,
DOI : 10.1007/978-3-540-25976-3_15
Security with Noisy Data, 2008. ,
DOI : 10.1007/978-1-84628-984-2
Privacy protecting biometric authentication systems: an overview, 2004. ,
Biometric cryptosystems: issues and challenges, Proceedings of the IEEE, pp.948-960, 2004. ,
DOI : 10.1109/JPROC.2004.827372
Reliable biometric authentication with privacy protection, SPIE Biometric Technology for Human Identification Conf, 2004. ,
Protocols for secure remote database access with approximate matching, 2000. ,