A review on performance, security and various biometric template protection schemes for biometric authentication systems A Sarkar, BK Singh Multimedia Tools and Applications 79 (37), 27721-27776, 2020 | 89 | 2020 |
Cryptographic key generation from cancelable fingerprint templates A Sarkar, BK Singh 2018 4th international conference on recent advances in information …, 2018 | 22 | 2018 |
Cryptographic key generation scheme from cancellable biometrics A Sarkar, BK Singh, U Bhaumik Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017 …, 2018 | 13 | 2018 |
A novel session key generation and secure communication establishment protocol using fingerprint biometrics A Sarkar, BK Singh Handbook of Computer Networks and Cyber Security: Principles and Paradigms …, 2020 | 10 | 2020 |
A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function A Sarkar, BK Singh Multimedia Tools and Applications 80, 799-829, 2021 | 8 | 2021 |
RSA key generation from cancelable fingerprint biometrics A Sarkar, BK Singh, U Bhaumik 2017 International Conference on Computing, Communication, Control and …, 2017 | 7 | 2017 |
A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography A Sarkar, B Singh International Journal of System Assurance Engineering and Management 10 (5 …, 2019 | 6 | 2019 |
Cancelable biometric based key generation for symmetric cryptography A Sarkar, BK Singh 2017 International Conference on Inventive Communication and Computational …, 2017 | 6 | 2017 |
A review on different biometric template protection methods A Sarkar, BK Singh Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021 | 5 | 2021 |
A cancelable fingerprint biometric based session key establishment protocol A Sarkar, BK Singh Multimedia Tools and Applications 78, 21645-21671, 2019 | 4 | 2019 |
A Review on Security Attacks in Biometric Authentication Systems A Sarkar, BK Singh International Research Journal of Engineering and Technology 5 (12), 1300-1304, 2018 | 3 | 2018 |
Design of a dual signature scheme using ECDSA in set protocol A Sarkar, S Tripathi International Journal of Computer Applications 88 (11), 2014 | 3 | 2014 |
Authentication scheme using novel chaff generation method in fuzzy vault. M Singh, R Shaw, A Sarkar, BK Singh RICE, 89-92, 2017 | 1 | 2017 |
Removal of certificates from set protocol using certificateless public key cryptography A Sarkar, S Tripathi International Journal of Network Security & Its Applications 4 (6), 157, 2012 | 1 | 2012 |
Design of a hybrid approach using a revocable technique and steganographic text color coding technique for fingerprint template protection A Sarkar, BK Singh Multimedia Tools and Applications 80 (13), 20641-20670, 2021 | | 2021 |
DESIGN OF TEMPLATE PROTECTION SCHEMES FOR BIOMETRIC AUTHENTICATION SYSTEMS A Sarkar NIT Jamshedpur, 2021 | | 2021 |