Preventing the decodability attack based cross-matching in a fuzzy commitment scheme EJC Kelkboom, J Breebaart, TAM Kevenaar, I Buhan, RNJ Veldhuis IEEE Transactions on Information Forensics and Security 6 (1), 107-121, 2010 | 146 | 2010 |
Fuzzy extractors for continuous distributions I Buhan, J Doumen, P Hartel, R Veldhuis Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 128 | 2007 |
Biometric template protection: The need for open standards J Breebaart, B Yang, I Buhan-Dulman, C Busch Datenschutz und Datensicherheit-DuD 33 (5), 299-304, 2009 | 82 | 2009 |
Sok: Design tools for side-channel-aware implementations I Buhan, L Batina, Y Yarom, P Schaumont Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 57 | 2022 |
A systematic appraisal of side channel evaluation strategies M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ... Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020 | 54 | 2020 |
Constructing practical fuzzy extractors using qim IR Buhan, JM Doumen, PH Hartel, RNJ Veldhuis Centre for Telematics and Information Technology (CTIT), 2007 | 46 | 2007 |
The state of the art in abuse of biometrics IR Buhan, PH Hartel Centre for Telematics and Information Technology (CTIT), 2005 | 46 | 2005 |
Learning when to stop: A mutual information approach to prevent overfitting in profiled side-channel analysis G Perin, I Buhan, S Picek International Workshop on Constructive Side-Channel Analysis and Secure …, 2021 | 37 | 2021 |
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem I Buhan, J Breebaart, J Guajardo, K de Groot, E Kelkboom, T Akkermans International Workshop on Data Privacy Management, 78-92, 2009 | 34 | 2009 |
Secure ad-hoc pairing with biometrics: SAfE IR Buhan, JM Doumen, PH Hartel, RNJ Veldhuis First International Workshop on Security for Spontaneous Interaction, IWSSI …, 2007 | 34 | 2007 |
Analytical template protection performance and maximum key size given a gaussian-modeled biometric source EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis Biometric Technology for Human Identification VII 7667, 119-130, 2010 | 30 | 2010 |
Secure pairing with biometrics I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis International Journal of Security and Networks 4 (1-2), 27-42, 2009 | 26 | 2009 |
Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis IEEE Transactions on information forensics and security 7 (4), 1225-1241, 2012 | 23 | 2012 |
Efficient strategies to play the indistinguishability game for fuzzy sketches I Buhan, J Guajardo, E Kelkboom 2010 IEEE International Workshop on Information Forensics and Security, 1-6, 2010 | 22 | 2010 |
A survey of the security and privacy measures for anonymous biometric authentication systems I Buhan, E Kelkboom, K Simoens 2010 Sixth International Conference on Intelligent Information Hiding and …, 2010 | 20 | 2010 |
Embedding renewable cryptographic keys into continuous noisy data I Buhan, J Doumen, P Hartel, Q Tang, R Veldhuis Information and Communications Security: 10th International Conference …, 2008 | 20 | 2008 |
Cryptographic keys from noisy data, theory and applications IR Buhan | 16 | 2008 |
Controlling leakage of biometric information using dithering I Buhan, J Doumen, P Hartel 2008 16th European Signal Processing Conference, 1-5, 2008 | 16 | 2008 |
Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis IR Buhan, JM Doumen, PH Hartel, RNJ Veldhuis Centre for Telematics and Information Technology (CTIT), 2006 | 13 | 2006 |
Feeling is believing: a secure template exchange protocol I Buhan, J Doumen, P Hartel, R Veldhuis Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007 | 12 | 2007 |