Biometric identification over encrypted data made feasible Identification via channels. Information Theory On identification via multiway channels with feedback. Information Theory Cryptographic processors ? a survey, Fifth International Conference on Information Systems Security Proceedings of the IEEE, pp.15-291519, 1989. ,
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM, vol.51, issue.1, pp.117-122, 2008. ,
DOI : 10.1145/1327452.1327494
Cancelable keybased fingerprint templates, pp.242-252 ,
DOI : 10.1007/11506157_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.474.332
Reconstructing Algebraic Functions from Mixed Data, IEEE Transactions on Circuits and Systems for Video Technology, pp.487-51086, 1998. ,
DOI : 10.1137/S0097539796297577
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.4076
Systematic methods for the computation of the directional fields and singular points of fingerprints, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.7, pp.905-919, 2002. ,
Deterministic and Efficiently Searchable Encryption, CRYPTO'07, pp.535-552, 2007. ,
DOI : 10.1007/978-3-540-74143-5_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.2792
Entity Authentication and Key Distribution, CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology, pp.232-249, 1993. ,
DOI : 10.1007/3-540-48329-2_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3423
A note on error detection codes for asymmetric channels, Information and Control, vol.4, issue.1, pp.68-73, 1961. ,
DOI : 10.1016/S0019-9958(61)80037-5
Rate-Distortion Theory, A Mathematical Basis for Data Compression, 1971. ,
New constructions and practical applications for private stream searching (extended abstract), IEEE Symposium on Security and Privacy, pp.132-139, 2006. ,
Space/time trade-offs in hash coding with allowable errors, Commun. ACM, vol.13, issue.7, pp.422-426, 1970. ,
Biometric perils and patches, Pattern Recognition, vol.35, issue.12, pp.2727-2738, 2002. ,
Public Key Encryption with Keyword Search, EURO- CRYPT'04, pp.506-522, 2004. ,
DOI : 10.1007/978-3-540-24676-3_30
Public Key Encryption That Allows PIR Queries, pp.50-67, 2007. ,
DOI : 10.1007/978-3-540-74143-5_4
On a class of error correcting binary group codes, Information and Control, vol.3, issue.1, pp.68-79, 1960. ,
DOI : 10.1016/S0019-9958(60)90287-4
Information Security and Privacy, 10th Australasian Conference, Proceedings, 2005. ,
Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004. ,
DOI : 10.1145/1030083.1030096
Secret-Key Reconciliation by Public Discussion, EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp.410-423, 1994. ,
DOI : 10.1007/3-540-48285-7_35
An Authentication Protocol with Encrypted Biometric Data, Lecture Notes in Computer Science, vol.5023, pp.109-124, 2008. ,
DOI : 10.1007/978-3-540-68164-9_8
RFID key establishment against active adversaries, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 2009. ,
DOI : 10.1109/WIFS.2009.5386458
Theoretical and practical boundaries of binary secure sketches. Information Forensics and Security, IEEE Transactions on, vol.3, issue.4, pp.673-683, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00346970
Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007. ,
DOI : 10.1109/BTAS.2007.4401904
URL : https://hal.archives-ouvertes.fr/hal-00270547
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function ,
DOI : 10.1007/978-3-540-85855-3_6
Extending Match-On-Card to Local Biometric Identification, Biometric ID Management and Multimodal Communication, 2009. ,
DOI : 10.1007/3-540-44499-8_24
The best of both worlds: Applying secure sketches to cancelable biometrics, Science of Computer Programming, vol.74, issue.1-2, pp.43-51, 2008. ,
DOI : 10.1016/j.scico.2008.09.016
Anonymous identification with cancelable biometrics, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, 2009. ,
DOI : 10.1109/ISPA.2009.5297678
Error-Tolerant Searchable Encryption, 2009 IEEE International Conference on Communications, pp.1-6, 2009. ,
DOI : 10.1109/ICC.2009.5199004
Identification with encrypted biometric data, Security and Communication Networks, vol.963, issue.11, 2010. ,
DOI : 10.1002/sec.206
URL : https://hal.archives-ouvertes.fr/hal-00872228
Private Interrogation of Devices via Identification Codes, INDOCRYPT '09: Proceedings of the 10th International Conference on Cryptology in India, pp.272-289, 2009. ,
DOI : 10.1007/978-3-642-10628-6_19
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Lecture Notes in Computer Science, vol.4586, pp.96-106, 2007. ,
DOI : 10.1007/978-3-540-73458-1_8
Extended Private Information Retrieval and Its Application in Biometrics Authentications, Lecture Notes in Computer Science, vol.4856, pp.175-193, 2007. ,
DOI : 10.1007/978-3-540-76969-9_12
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication, Lecture Notes in Computer Science, vol.5312, pp.219-230, 2008. ,
DOI : 10.1007/978-3-540-89598-5_15
URL : https://hal.archives-ouvertes.fr/inria-00419151
An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication, 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp.180-185, 2007. ,
DOI : 10.1109/AUTOID.2007.380616
A quantitative analysis of crossmatching resilience for a continuous-domain biometric encryption technique, First International Workshop on Signal Processing in the EncryptEd Domain, p.9, 2009. ,
Embedding Renewable Cryptographic Keys into Continuous Noisy Data, Information and Communications Security, pp.294-310, 2008. ,
DOI : 10.1109/18.333884
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.546.8751
Fuzzy extractors for continuous distributions, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.353-355, 2007. ,
DOI : 10.1145/1229285.1229325
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2298
Efficient Conjunctive Keyword Search on Encrypted Data Storage System, EuroPKI, pp.184-196, 2006. ,
DOI : 10.1007/11774716_15
Linking information reconciliation and privacy amplification, Advances in Cryptology ? EURO- CRYPT'94, pp.266-274, 1995. ,
DOI : 10.1007/BFb0053442
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.3898
Integrity (I) codes: message integrity protection and authentication over insecure channels, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.280-294, 2006. ,
DOI : 10.1109/SP.2006.23
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels, IEEE Transactions on Dependable and Secure Computing, vol.5, issue.4, pp.208-223, 2008. ,
DOI : 10.1109/TDSC.2008.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.389.7769
On iterated logarithm solutions to identification protocols, IEEE Information Theory Workshop 2010 (ITW 2010), 2010. ,
DOI : 10.1109/ITWKSPS.2010.5503130
Noisy Cryptographic Protocols for Low-Cost RFID Tags, IEEE Transactions on Information Theory, vol.52, issue.8, pp.3562-3566, 2006. ,
DOI : 10.1109/TIT.2006.878219
URL : http://autoid.mit.edu/pickup/RFID_Papers/025.pdf
Privacy Preserving Keyword Searches on Remote Encrypted Data, Applied Cryptography and Network Security Conference (ACNS), 2005. ,
DOI : 10.1007/11496137_30
Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998. ,
DOI : 10.1145/293347.293350
Upper Bounds on Separating Codes, CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pp.1291-1294, 2004. ,
DOI : 10.1109/TIT.2004.828140
The Design of Rijndael, 2002. ,
DOI : 10.1007/978-3-662-04722-4
High confidence visual recognition of persons by a test of statistical independence, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.15, issue.11, pp.1148-1161, 1993. ,
DOI : 10.1109/34.244676
The importance of being random: statistical principles of iris recognition, Pattern Recognition, vol.36, issue.2, pp.279-291, 2003. ,
DOI : 10.1016/S0031-3203(02)00030-4
On enabling secure applications through off-line biometric identification, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), p.148, 1998. ,
DOI : 10.1109/SECPRI.1998.674831
A New Framework for RFID Privacy, Cryptology ePrint Archive, 2010. ,
DOI : 10.1007/978-3-642-15497-3_1
The transport layer security (TLS) protocol version 1.1. RFC 4346, 2006. ,
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008. ,
DOI : 10.1137/060651380
Correcting errors without leaking partial information, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , STOC '05, pp.654-663, 2005. ,
DOI : 10.1145/1060590.1060688
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3846
Performance evaluation of non-ideal iris based recognition system implementing global ICA encoding, IEEE International Conference on Image Processing 2005, pp.285-293, 2005. ,
DOI : 10.1109/ICIP.2005.1530384
Secure storage of fingerprint biometrics using Slepian-Wolf codes, Information Theory and Applications Workshop, 2007. ,
Using distributed source coding to secure fingerprint biometrics, 2007. ,
Identification via channels and constantweight codes ,
Anonymous and Revocable Fingerprint Recognition, 2007 IEEE Conference on Computer Vision and Pattern Recognition, 2007. ,
DOI : 10.1109/CVPR.2007.383382
Storing a sparse table with O(1) worst case access time, p.31, 1984. ,
Development of neuronal selectivity in primary visual cortex of cat, Physiological Reviews, vol.64, issue.1, pp.325-434, 1984. ,
Preserving RFID data privacy, IEEE International Conference on RFID ? RFID 2009, 2009. ,
On the secret-key rate of binary random variables, IEEE International Symposium on Information Theory, p.351, 1994. ,
A survey on private information retrieval ,
Single-Database Private Information Retrieval with Constant Communication Rate, Lecture Notes in Computer Science, vol.3580, pp.803-815, 2005. ,
DOI : 10.1007/11523468_65
URL : http://cgis.cs.umd.edu/~gasarch/pir/logn.pdf
Protecting data privacy in private information retrieval schemes, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.151-160, 1998. ,
DOI : 10.1145/276698.276723
Some cryptographic aspects of womcodes In Lecture notes in computer sciences; 218 on Advances in cryptology?CRYPTO 85, pp.458-467, 1986. ,
Computation of Cryptographic Keys from Face Biometrics, Communications and Multimedia Security, pp.1-13, 2003. ,
DOI : 10.1007/978-1-4615-3198-2
Secure indexes. Cryptology ePrint Archive, Report, vol.216216, 2003. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
Improved decoding of Reed-Solomon and algebraic-geometry codes, IEEE Transactions on Information Theory, vol.45, issue.6, pp.1757-1767, 1999. ,
DOI : 10.1109/18.782097
Reflections on " improved decoding of Reed-Solomon and algebraic-geometric codes, IEEE Information Theory Newsletter, 2002. ,
Maximum-Likelihood Decoding of Reed???Solomon Codes is NP-Hard, SODA '05: Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, pp.470-478, 2005. ,
DOI : 10.1109/TIT.2005.850102
Biometrics, Access Control, Smart Cards: A Not So Simple Combination, Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, pp.273-288, 2001. ,
DOI : 10.1007/978-0-387-35528-3_16
The S/KEY one-time password system, Proceedings of the Internet Society Symposium on Network and Distributed Systems, pp.151-157, 1994. ,
Combining crypto with biometrics effectively, IEEE Transactions on Computers, vol.55, issue.9, pp.1081-1088, 2006. ,
A fast search algorithm for a large fuzzy database, IEEE Transactions on Information Forensics and Security, vol.3, issue.2, pp.203-212, 2008. ,
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, pp.339-352, 1995. ,
DOI : 10.1007/3-540-44750-4_27
All Iris Code Bits are Not Created Equal, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007. ,
DOI : 10.1109/BTAS.2007.4401908
The Vulnerabilities Analysis of Fuzzy Vault Using Password, 2008 Second International Conference on Future Generation Communication and Networking, pp.76-83, 2008. ,
DOI : 10.1109/FGCN.2008.211
Nearest Neighbors in High-Dimensional Spaces, Handbook of Discrete and Computational Geometry, chapter 39, 2004. ,
DOI : 10.1201/9781420035315.ch39
Approximate nearest neighbors, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.604-613, 1998. ,
DOI : 10.1145/276698.276876
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number, Lecture Notes in Computer Science, vol.3072, pp.117-123, 2004. ,
DOI : 10.1007/978-3-540-25948-0_17
A fuzzy vault scheme. Designs, Codes and Cryptography, pp.237-257, 2006. ,
DOI : 10.1007/s10623-005-6343-z
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
Defining strong privacy for RFID, PERCOMW, pp.342-347, 2007. ,
Emerging challenges: Mobile networking for “Smart Dust”, Journal of Communications and Networks, vol.2, issue.3, pp.188-196, 2000. ,
DOI : 10.1109/JCN.2000.6596708
Energy Scalable Universal Hashing, IEEE Transactions on Computers, vol.54, issue.12, pp.1484-1495, 2005. ,
DOI : 10.1109/TC.2005.195
Face recognition with renewable and privacy preserving binary templates, AUTOID '05: Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp.21-26, 2005. ,
Public key encryption with keyword search based on K-resilient IBE, pp.298-308, 2006. ,
Polynomial Reconstruction Based Cryptography, Selected Areas in Cryptography, pp.129-133, 2001. ,
DOI : 10.1007/3-540-45537-X_10
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes, International Colloquium on Automata, Languages and Programming, pp.232-243, 2002. ,
DOI : 10.1007/3-540-45465-9_21
Cryptographic hardness based on the decoding of Reed-Solomon codes with applications, Electronic Colloquium on Computational Complexity (ECCC), 2002. ,
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2752-2769, 2008. ,
DOI : 10.1007/3-540-45465-9_21
Distance-Sensitive Bloom Filters, Algorithm Engineering & Experiments, 2006. ,
DOI : 10.1137/1.9781611972863.4
An analysis of BioHashing and its variants, Pattern Recognition, vol.39, issue.7, pp.1359-1368, 2006. ,
DOI : 10.1016/j.patcog.2005.10.025
Strongly universal hashing and identification codes via channels. Information Theory, IEEE Transactions on, vol.45, issue.6, pp.2091-2095, 1999. ,
DOI : 10.1109/18.782144
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.3933
Efficient search for approximate nearest neighbor in high dimensional spaces, Symposium on the Theory Of Computing, pp.614-623, 1998. ,
One-Time Templates for Face Authentication, 2007 International Conference on Convergence Information Technology (ICCIT 2007), pp.1818-1823, 2007. ,
DOI : 10.1109/ICCIT.2007.372
New shielding functions to enhance privacy and prevent misuse of biometric templates, Audio-and Video-Based Biometric Person Authentication, pp.393-402, 2003. ,
An Oblivious Transfer Protocol with Log-Squared Communication, pp.314-328, 2005. ,
DOI : 10.1007/11556992_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8549
Iris recognition and verification experiments with improved segmentation method, AutoID'2005, 2005. ,
The Theory of Error- Correcting Codes (North-Holland Mathematical Library), 1983. ,
FVC2000: fingerprint verification competition, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.3, pp.402-412, 2002. ,
DOI : 10.1109/34.990140
URL : http://biometrics.cse.msu.edu/Publications/Fingerprint/FVC/Maioetal_FVC2000_PAMI02.pdf
Handbook of Fingerprint Recognition, 2003. ,
DOI : 10.1007/978-1-84882-254-2
Probabilistic characteristics of graphs with large connectivity, Problemy Pereda?i Informacii, vol.10, issue.2, pp.101-108, 1974. ,
Information-theoretically secure secret-key agreement by not authenticated public discussion, EUROCRYPT'97, 1997. ,
Secret-key agreement over unauthenticated public channels II: the simulatability condition, IEEE Transactions on Information Theory, vol.49, issue.4, pp.832-838, 2003. ,
On the average list size for the Guruswami-Sudan decoder, ISCTA03, 2003. ,
The Achilles' heel of fingerprints. The Washington Post, 2004. ,
Privacy and security in library RFID, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.210-219, 2004. ,
DOI : 10.1145/1030083.1030112
A framework for the design of good watermark identification codes, Security, Steganography, and Watermarking of Multimedia Contents VIII, p.60721, 2006. ,
DOI : 10.1117/12.644642
Application of Boolean algebra to switching circuit design and to error detection, Transactions of the I.R.E. Professional Group on Electronic Computers, vol.3, issue.3, pp.6-12, 1954. ,
DOI : 10.1109/IREPGELC.1954.6499441
Hardening Fingerprint Fuzzy Vault Using Password, In Advances in Biometrics Lecture Notes in Computer Science, vol.4642, pp.927-937, 2009. ,
DOI : 10.1007/978-3-540-74549-5_97
Fingerprints don't lie, 1951. ,
RFID Privacy Models Revisited, Lecture Notes in Computer Science, vol.48, issue.9, pp.251-266, 2008. ,
DOI : 10.1145/1368310.1368351
RFID privacy issues and technical challenges, Communications of the ACM, vol.48, issue.9, pp.66-71, 2005. ,
DOI : 10.1145/1081992.1082022
Worst-case interactive communication. I. Two messages are almost optimal, IEEE Transactions on Information Theory, vol.36, issue.5, pp.1111-1126, 1990. ,
DOI : 10.1109/18.57210
Worst-case interactive communication. II. Two messages are not optimal, IEEE Transactions on Information Theory, vol.37, issue.4, pp.995-1005, 1991. ,
DOI : 10.1109/18.86993
Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report, vol.064, 2007. ,
A survey of single database PIR: Techniques and applications. Cryptology ePrint Archive, Report, p.59, 2007. ,
Private information storage (extended abstract), Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.294-303, 1997. ,
DOI : 10.1145/258533.258606
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.4287
Traceable Privacy of Recent Provably-Secure RFID Protocols, Proceedings of the 6th International Conference on Applied Cryptography and Network Security ? ACNS 2008, pp.479-489, 2008. ,
DOI : 10.1007/978-3-540-68914-0_29
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology, Proceedings of EUROCRYPT '99, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Mutual authentication in RFID: security and privacy, ASIACCS, pp.292-299, 2008. ,
Communication complexity of computing the Hamming distance, SIAM Journal on Computing, vol.15, issue.4, pp.932-947, 1986. ,
Two-Factor Cancelable Biometrics Authenticator, Journal of Computer Science and Technology, vol.12, issue.5, pp.54-59, 2007. ,
DOI : 10.1007/s11390-007-9006-x
The FERET evaluation methodology for face-recognition algorithms, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22, issue.10, pp.1090-1104, 2000. ,
On biometric keys, their information content and proper use, Conference on Biometric Feature Identification and Analysis, 2007. ,
Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
Cancelable biometrics: A case study in fingerprints, International Conference on Pattern Recognition, pp.370-373, 2006. ,
Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.561-572, 2007. ,
DOI : 10.1109/TPAMI.2007.1004
A class of multiple-error-correcting codes and the decoding scheme, Transactions of the IRE Professional Group on Information Theory, vol.4, issue.4, pp.38-42, 1954. ,
DOI : 10.1109/TIT.1954.1057465
Security and Privacy of Radio Frequency Identification, 2008. ,
On data banks and privacy homomorphisms, Foundations of Secure Computation, pp.169-177, 1978. ,
Biometric attack vectors and defences, Computers & Security, vol.26, issue.1, pp.14-25, 2007. ,
DOI : 10.1016/j.cose.2006.12.008
List Decoding and Property Testing of Error Correcting Codes, 2007. ,
Efficient conjunctive keywordsearchable encryption, AINA Workshops, pp.409-414, 2007. ,
User privacy in transport systems based on RFID e-tickets, Workshop on Privacy in Location-Based Applications ? PILBA'08, 2008. ,
Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science, vol.3494, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Liveness Detection in Fingerprint Recognition Systems, 2004. ,
Efficient Binary Conversion for Paillier Encrypted Values, pp.522-537, 2006. ,
DOI : 10.1007/11761679_31
Cracking fuzzy vaults and biometric encryption, Proceedings of the Biometric Symposium, 2007. ,
Adaptively secure computationally efficient searchable symmetric encryption, 2009. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
A mathematical theory of communication. The Bell System Technical Journal, pp.379-423, 1948. ,
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
NTL: A library for doing number theory ,
Privacy Weaknesses in Biometric Sketches, 2009 30th IEEE Symposium on Security and Privacy, pp.188-203, 2009. ,
DOI : 10.1109/SP.2009.24
Privacy Enhancing Technologies for RFID -A Critical Investigation of State of the Art Research, IEEE Privacy and Security, 2009. ,
Minority Report. DreamWorks, 20th Century Fox, 2002. ,
Graph matching iris image blocks with local binary pattern Feature extraction for a slepian-wolf biometric system using LDPC codes, International Conference on Biometrics IEEE International Symposium on Information Theory, pp.366-372, 2006. ,
Feature extraction for a Slepian-Wolf biometric system using LDPC codes, 2008 IEEE International Symposium on Information Theory, pp.2297-2301, 2008. ,
DOI : 10.1109/ISIT.2008.4595400
Feature transformation of biometric templates for secure biometric systems based on error correcting codes, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp.1-6, 2008. ,
DOI : 10.1109/CVPRW.2008.4563111
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes, Information Security Practice and Experience, pp.56-70, 2008. ,
DOI : 10.1007/978-3-540-79104-1_5
URL : https://hal.archives-ouvertes.fr/inria-00419156
A recursive approach to low complexity codes, IEEE Transactions on Information Theory, vol.27, issue.5, pp.533-547, 1981. ,
DOI : 10.1109/TIT.1981.1056404
Discrete Isoperimetric Inequalities and the Probability of a Decoding Error, Combinatorics, Probability and Computing, vol.9, issue.5, pp.465-479, 2000. ,
DOI : 10.1017/S0963548300004466
Practical Biometric Authentication with Template Protection, AVBPA, pp.436-446, 2005. ,
DOI : 10.1007/11527923_45
Capacity and examples of templateprotecting biometric authentication systems ,
A proposal of one-time biometric authentication, Security and Management, pp.78-83, 2006. ,
Attacks on biometric systems: a case study in fingerprints, Security, Steganography, and Watermarking of Multimedia Contents VI, 2004. ,
DOI : 10.1117/12.530907
Fuzzy Vault for Fingerprints, 2004. ,
DOI : 10.1007/11527923_32
Efficient Biometric Verification in Encrypted Domain, Lecture Notes in Computer Science, vol.5558, pp.899-908, 2009. ,
DOI : 10.1007/978-3-642-01793-3_91
On Privacy Models for RFID, Lecture Notes in Computer Science, vol.4833, pp.68-87, 2007. ,
DOI : 10.1007/978-3-540-76900-2_5
Key extraction for general non-discrete signals, 2009. ,
Explicit construction of optimal constant-weight codes for identification via channels. Information Theory, IEEE Transactions on, vol.39, issue.1, pp.30-36, 1993. ,
Frontal face dataset. http://www.vision.caltech. edu/html-files/archive, California Institute of Technology, 1999. ,
Security and privacy aspects of low-cost radio frequency identification systems, Security in Pervasive Computing, pp.201-212, 2003. ,
Codes and Decoding on general Graphs, 1996. ,
Asymptotic bounds on frameproof codes Information Theory, IEEE Transactions on, vol.48, issue.11, pp.2991-2995, 2002. ,
Universal hashing for ultra-low-power cryptographic hardware applications, 2004. ,
Threshold effects in codes, Algebraic Coding, pp.278-286, 1993. ,
DOI : 10.1007/3-540-57843-9_29