CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
FVC2000: Fingerprint Verification Competition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Privacy Weaknesses in Biometric Sketches
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Approximate message authentication and biometric entity authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Robust fuzzy extractors and authenticated key agreement from close secrets
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Theoretical and Practical Boundaries of Binary Secure Sketches
IEEE Transactions on Information Forensics and Security
A Fast Search Algorithm for a Large Fuzzy Database
IEEE Transactions on Information Forensics and Security
Practical attacks on HB and HB+ protocols
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
Hidden bits approach for authentication in RFID systems
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Hi-index | 0.00 |
We describe the architecture of a biometric terminal designed to respect privacy. We show how to rely on a secure module equipped with Match-On-Card technology to ensure the confidentiality of biometric data of registered users. Our proposal relies on a new way of using the quantization functionality of Secure Sketches that enables identification.