Generating and sharing biometrics based session keys for secure cryptographic applications
S Kanade, D Petrovska-Delacrétaz… - 2010 Fourth IEEE …, 2010 - ieeexplore.ieee.org
Crypto-biometric systems, which combine biometrics with cryptographic systems, are
gaining more and more attention. Person verification with high degree of assurance offered …
gaining more and more attention. Person verification with high degree of assurance offered …
Key derivation with physical unclonable functions
M Hiller - 2016 - mediatum.ub.tum.de
Physical Unclonable Functions (PUFs) evaluate manufacturing variations to derive unique
secret keys from integrated circuits. Error correction is needed for generating reliable keys …
secret keys from integrated circuits. Error correction is needed for generating reliable keys …
A novel session key generation and secure communication establishment protocol using fingerprint biometrics
Security of information is provided by various cryptographic techniques. Symmetric key
cryptography is one of such methods which require a shared secret key between two parties …
cryptography is one of such methods which require a shared secret key between two parties …
Sécurité des systèmes biométriques: révocabilité et protection de la vie privée
RO Belguechi - 2015 - theses.hal.science
En référence à la sécurité informatique, la biométrie concerne l'utilisation des
caractéristiques morphologiques ou comportementales pour déterminer ou vérifier l'identité …
caractéristiques morphologiques ou comportementales pour déterminer ou vérifier l'identité …
[PDF][PDF] Security capacity of the fuzzy fingerprint vault
J Merkle, M Niesing, M Schwaiger, H Ihmor… - International Journal on …, 2010 - Citeseer
We investigate the security of a privacy enhancing technique for fingerprint authentication
known as fuzzy fingerprint vault. This technique is based on the fuzzy vault of Jules and …
known as fuzzy fingerprint vault. This technique is based on the fuzzy vault of Jules and …
A reference framework for the privacy assessment of keyless biometric template protection systems
T Kevenaar, U Korte, J Merkle, M Niesing, H Ihmor… - 2010 - dl.gi.de
: Over the past decades, a number of methods have been reported in the scientific literature
to protect the privacy of biometric information stored in biometric systems. Keyless Biometric …
to protect the privacy of biometric information stored in biometric systems. Keyless Biometric …
Controlling leakage of biometric information using dithering
Fuzzy extractors allow cryptographic keys to be generated from noisy, non-uniform biometric
data. Fuzzy extractors can be used to authenticate a user to a server without storing her …
data. Fuzzy extractors can be used to authenticate a user to a server without storing her …
Multi-biometrics based crypto-biometric session key generation and sharing protocol
S Kanade, D Petrovska-Delacrétaz… - Proceedings of the …, 2011 - dl.acm.org
In this paper, the issue of generating and sharing biometrics based secure cryptographic
keys is addressed. In particular, we propose a protocol which integrates multi-biometrics, in …
keys is addressed. In particular, we propose a protocol which integrates multi-biometrics, in …
The process matters: cyber security in industrial control systems
D Hadžiosmanović - 2014 - research.utwente.nl
An industrial control system (ICS) is a computer system that controls industrial processes
such as power plants, water and gas distribution, food production, etc. Since cyber-attacks …
such as power plants, water and gas distribution, food production, etc. Since cyber-attacks …
A novel crypto-biometric scheme for establishing secure communication sessions between two clients
SG Kanade, D Petrovska-Delacrétaz… - … BIOSIG-proceedings of …, 2012 - ieeexplore.ieee.org
Biometrics and cryptography are two tools which have high potential for providing
information security and privacy. A combination of these two can eliminate their individual …
information security and privacy. A combination of these two can eliminate their individual …