Generating and sharing biometrics based session keys for secure cryptographic applications

S Kanade, D Petrovska-Delacrétaz… - 2010 Fourth IEEE …, 2010 - ieeexplore.ieee.org
Crypto-biometric systems, which combine biometrics with cryptographic systems, are
gaining more and more attention. Person verification with high degree of assurance offered …

Key derivation with physical unclonable functions

M Hiller - 2016 - mediatum.ub.tum.de
Physical Unclonable Functions (PUFs) evaluate manufacturing variations to derive unique
secret keys from integrated circuits. Error correction is needed for generating reliable keys …

A novel session key generation and secure communication establishment protocol using fingerprint biometrics

A Sarkar, BK Singh - Handbook of Computer Networks and Cyber Security …, 2020 - Springer
Security of information is provided by various cryptographic techniques. Symmetric key
cryptography is one of such methods which require a shared secret key between two parties …

Sécurité des systèmes biométriques: révocabilité et protection de la vie privée

RO Belguechi - 2015 - theses.hal.science
En référence à la sécurité informatique, la biométrie concerne l'utilisation des
caractéristiques morphologiques ou comportementales pour déterminer ou vérifier l'identité …

[PDF][PDF] Security capacity of the fuzzy fingerprint vault

J Merkle, M Niesing, M Schwaiger, H Ihmor… - International Journal on …, 2010 - Citeseer
We investigate the security of a privacy enhancing technique for fingerprint authentication
known as fuzzy fingerprint vault. This technique is based on the fuzzy vault of Jules and …

A reference framework for the privacy assessment of keyless biometric template protection systems

T Kevenaar, U Korte, J Merkle, M Niesing, H Ihmor… - 2010 - dl.gi.de
: Over the past decades, a number of methods have been reported in the scientific literature
to protect the privacy of biometric information stored in biometric systems. Keyless Biometric …

Controlling leakage of biometric information using dithering

I Buhan, J Doumen, P Hartel - 2008 16th European Signal …, 2008 - ieeexplore.ieee.org
Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric
data. Fuzzy extractors can be used to authenticate a user to a server without storing her …

Multi-biometrics based crypto-biometric session key generation and sharing protocol

S Kanade, D Petrovska-Delacrétaz… - Proceedings of the …, 2011 - dl.acm.org
In this paper, the issue of generating and sharing biometrics based secure cryptographic
keys is addressed. In particular, we propose a protocol which integrates multi-biometrics, in …

The process matters: cyber security in industrial control systems

D Hadžiosmanović - 2014 - research.utwente.nl
An industrial control system (ICS) is a computer system that controls industrial processes
such as power plants, water and gas distribution, food production, etc. Since cyber-attacks …

A novel crypto-biometric scheme for establishing secure communication sessions between two clients

SG Kanade, D Petrovska-Delacrétaz… - … BIOSIG-proceedings of …, 2012 - ieeexplore.ieee.org
Biometrics and cryptography are two tools which have high potential for providing
information security and privacy. A combination of these two can eliminate their individual …