БИОМЕТРИЧЕСКИЕ КРИПТОГРАФИЧЕСКИЕ СИСТЕМЫ И ИХ ПРИМЕНЕНИЕ
Аннотация
Полный текст:
PDFЛитература
1 Uludag U., Pankanti S., Prabhakar S., Jain A. K. Biometric cryptosystems: issues and challenges // Proceedings of the IEEE. 2004. Vol. 92. № 6. Р. 948-960.
2 Juels A., Sudan M. A Fuzzy Vault Scheme // Proceedings of IEEE International Symposium on Information Theory. Lausanne, Switzerland, 2002. Р. 408.
3 Dodis Y., Reyzin L., Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data // Advances in Cryptology - EUROCRYPT 2004. Christian Cachin and Jan Camenisch, ed. Vol. 3027 of Lecture Notes in Computer Science. Springer - Verlag, 2004. Р. 79-100.
4 Sahai A., Waters B. Fuzzy identity-based encryption // Proceedings of EUROCRYPT 2005, LNCS 3494. Springer - Verlag, 2005. Р. 457-473.
5 Baek J., Susilo W., Zhou J. New construction of fuzzy identity-based encryption // Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. ACM New York. NY, USA, 2007. Р. 368-370.
6 Fang L. M., Wang J. D., Ren Y. J., Xia J. Y., Bian S. Z. Chosen - Ciphertext Secure Fuzzy Identity - Based Key Encap- sulation without ROM. Cryptology ePrint Archive: Report 2008/139, 2008. URL: http://eprint.iacr.org/2008/139.
7 Fang L., Xia J. Full Security: Fuzzy Identity Based Encryption. Cryptology ePrint Archive: Report 2008/307. URL: http://eprint.iacr.org/2008/30
8 Yang P., Cao Z., Dong X. I. Fuzzy Identity Based Signature. Cryptology ePrint Archive: Report 2008/002. URL: http://eprint.iacr.org/2008/002.
9 Burnett A., Duffy A., Dowling T. A Biometric Identity Based Signature Scheme. Cryptology ePrint Archive: Report 2004/176. URL: http://eprint.iacr.org/2004/176.
10 Dodis Y., Katz J., Reyzin L., Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets // Advances in Cryptology - CRYPTO 2006. Cynthia Dwork, ed. Vol. 4117 of Lecture Notes in Computer Science. Springer - Verlag, 20 - 24 August 2006. Р. 232-250.
11 Kanukurthi B., Reyzin L. Key Agreement from Close Secrets over Unsecured Channels. Cryptology ePrint Archive: Report 2008/494. URL: http://eprint.iacr.org/2008/494.
12 Boyen X. Reusable cryptographic fuzzy extractors // Eleventh ACM Conference on Computer and Communication Security. ACM, October 25-29 2004. Р. 82-91.
13 Boyen X., Dodis Y., Katz J., Ostrovsky R., Smith A. Secure remote authentication using biometric data // Advances in Cryptol- ogy - EUROCRYPT 2005. R. Cramer, ed. Springer - Verlag, 2005. Vol. 3494 of LNCS. Р. 147-163.
Ссылки
- На текущий момент ссылки отсутствуют.

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.