Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamental limits for biometric identification with a database containing protected templates., and . ISITA, page 54-59. IEEE, (2010)On information leakage in fuzzy commitment., and . Media Forensics and Security, volume 7541 of SPIE Proceedings, page 75410P. SPIE, (2010)Identification and secret-key generation in biometric systems with protected templates., and . MM&Sec, page 63-66. ACM, (2010)On Privacy in Secure Biometric Authentication Systems., and . ICASSP (2), page 121-124. IEEE, (2007)Privacy Leakage in Binary Biometric Systems: From Gaussian to Binary Data., and . Security and Privacy in Biometrics, Springer, (2013)Achieving Secure Fuzzy Commitment Scheme for Optical PUFs., and . IIH-MSP, page 1185-1188. IEEE Computer Society, (2009)Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method., , , , and . ISIT, page 499-503. IEEE, (2006)Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication., and . IEEE Trans. Inf. Theory, 61 (10): 5583-5594 (2015)Reference point detection for improved fingerprint matching., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720G. SPIE, (2006)Identification and secret-key binding in binary-symmetric template-protected biometric systems., and . WIFS, page 1-5. IEEE, (2010)