On the guessability of binary biometric templates: A practical guessing entropy based approach | 1 | 0.35 | 2017 |
Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection | 3 | 0.43 | 2016 |
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication. | 13 | 0.56 | 2016 |
Biometric Feature-Type Transformation: Making templates compatible for secret protection | 7 | 0.48 | 2015 |
Fusing binary templates for multi-biometric cryptosystems | 4 | 0.38 | 2015 |
A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template. | 27 | 0.98 | 2014 |
Identifying Recurrent and Unknown Performance Issues | 8 | 0.45 | 2014 |
Masquerade attack on transform-based binary-template protection based on perceptron learning. | 7 | 0.49 | 2014 |
Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation. | 4 | 0.41 | 2013 |
Image Set-Based Face Recognition: A Local Multi-keypoint Descriptor-Based Approach | 1 | 0.36 | 2013 |
A novel encoding scheme for effective biometric discretization: Linearly Separable Subcode. | 15 | 0.66 | 2013 |
Discriminant Spectral Hashing for Compact Palmprint Representation. | 1 | 0.36 | 2013 |
An efficient dynamic reliability-dependent bit allocation for biometric discretization | 24 | 0.81 | 2012 |
Distance entropy as an information measure for binary biometric representation | 0 | 0.34 | 2012 |
An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding | 3 | 0.39 | 2012 |
Non-user-specific multivariate biometric discretization with medoid-based segmentation | 2 | 0.37 | 2011 |
An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation. | 6 | 0.37 | 2011 |
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting. | 9 | 8.05 | 2011 |
Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network. | 3 | 0.42 | 2011 |
Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization. | 2 | 0.37 | 2011 |
An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances. | 9 | 0.41 | 2011 |
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card. | 0 | 0.34 | 2009 |
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol | 0 | 0.34 | 2008 |
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves | 3 | 0.42 | 2008 |
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network | 1 | 0.39 | 2008 |
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol | 1 | 0.36 | 2008 |
An enhanced one-round pairing-based tripartite authenticated key agreement protocol | 6 | 0.46 | 2007 |
Secure Deniable Authenticated Key Establishment for Internet Protocols | 1 | 0.36 | 2007 |
Cryptanalysis Of Improved One-Round Lin-Li'S Tripartite Key Agreement Protocol | 2 | 0.37 | 2007 |
Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol | 5 | 0.45 | 2007 |
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol. | 5 | 0.43 | 2007 |
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol | 5 | 0.50 | 2007 |
An enhanced ID-based deniable authentication protocol on pairings | 10 | 0.81 | 2007 |