Παρακολούθηση
ileana buhan
ileana buhan
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα ru.nl - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
EJC Kelkboom, J Breebaart, TAM Kevenaar, I Buhan, RNJ Veldhuis
IEEE Transactions on Information Forensics and Security 6 (1), 107-121, 2010
1402010
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1272007
Biometric template protection: The need for open standards
J Breebaart, B Yang, I Buhan-Dulman, C Busch
Datenschutz und Datensicherheit-DuD 33 (5), 299-304, 2009
792009
Sok: Design tools for side-channel-aware implementations
I Buhan, L Batina, Y Yarom, P Schaumont
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
472022
The state of the art in abuse of biometrics
IR Buhan, PH Hartel
Centre for Telematics and Information Technology (CTIT), 2005
472005
Constructing practical fuzzy extractors using qim
IR Buhan, JM Doumen, PH Hartel, RNJ Veldhuis
Centre for Telematics and Information Technology (CTIT), 2007
452007
A systematic appraisal of side channel evaluation strategies
M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ...
Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020
442020
Secure ad-hoc pairing with biometrics: SAfE
IR Buhan, JM Doumen, PH Hartel, RNJ Veldhuis
First International Workshop on Security for Spontaneous Interaction, IWSSI …, 2007
352007
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
I Buhan, J Breebaart, J Guajardo, K de Groot, E Kelkboom, T Akkermans
International Workshop on Data Privacy Management, 78-92, 2009
312009
Analytical template protection performance and maximum key size given a gaussian-modeled biometric source
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
Biometric Technology for Human Identification VII 7667, 119-130, 2010
292010
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
G Perin, I Buhan, S Picek
Cryptology ePrint Archive, 2020
272020
Secure pairing with biometrics
I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis
International Journal of Security and Networks 4 (1-2), 27-42, 2009
262009
Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
IEEE Transactions on information forensics and security 7 (4), 1225-1241, 2012
222012
A survey of the security and privacy measures for anonymous biometric authentication systems
I Buhan, E Kelkboom, K Simoens
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
212010
Efficient strategies to play the indistinguishability game for fuzzy sketches
I Buhan, J Guajardo, E Kelkboom
2010 IEEE International Workshop on Information Forensics and Security, 1-6, 2010
202010
Embedding renewable cryptographic keys into continuous noisy data
I Buhan, J Doumen, P Hartel, Q Tang, R Veldhuis
Information and Communications Security: 10th International Conference …, 2008
192008
Controlling leakage of biometric information using dithering
I Buhan, J Doumen, P Hartel
2008 16th European Signal Processing Conference, 1-5, 2008
162008
Cryptographic keys from noisy data, theory and applications
IR Buhan
132008
Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis
IR Buhan, JM Doumen, PH Hartel, RNJ Veldhuis
Centre for Telematics and Information Technology (CTIT), 2006
132006
Feeling is believing: a secure template exchange protocol
I Buhan, J Doumen, P Hartel, R Veldhuis
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
122007
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20