Identification with encrypted biometric data.
Secur. Commun. Networks, 2011
Identification codes in cryptographic protocols.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
On the threshold of Maximum-Distance Separable codes.
Proceedings of the IEEE International Symposium on Information Theory, 2010
Identification with Encrypted Biometric Data Made Feasible
CoRR, 2009
RFID key establishment against active adversaries.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Private Interrogation of Devices via Identification Codes.
Proceedings of the Progress in Cryptology, 2009
Biometric Identification over Encrypted Data Made Feasible.
Proceedings of the Information Systems Security, 5th International Conference, 2009
Error-Tolerant Searchable Encryption.
Proceedings of IEEE International Conference on Communications, 2009
Extending Match-On-Card to Local Biometric Identification.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
Theoretical and Practical Boundaries of Binary Secure Sketches.
IEEE Trans. Inf. Forensics Secur., 2008
The best of both worlds: Applying secure sketches to cancelable biometrics.
Sci. Comput. Program., 2008
Pseudo Identities Based on Fingerprint Characteristics.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Optimal Iris Fuzzy Sketches
CoRR, 2007
Towards Soft Real-Time Applications on Enterprise Desktop Grids.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006