Data Management

Bibliography


  • [1] A. K. Jain. Biometric recognition: How do I know who you are?
    In SCIA, 2005.
  • [2] Simon Liu and Mark Silverman. A Practical Guide to Biometric Security Technology. IT Professional, 2001.
  • [3] Network Associates and Affiliated Companies. Identity Theft Kit.
    An Australian Government Initiative, 2004.
  • [4] Australian Government. Biometric Initiative.
    http://www.border.gov.au/, 2006.
  • [5] Whitfield Diffie and Martin Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, 1976.
  • [6] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Cryptographic Communications System and Method. U.S. Patent #4,405,829, US Patent and Trade Office,Washington DC, September 20 1983. MIT, Cambridge, MA.
  • [7] Bruce Schneier. Applied Cryptography (Second Edition).
    John Wiley & Sons, 1996.
  • [8] Mihir Bellare and Oded Goldreich. On defining proofs of knowledge.
    In Ernest F. Brickell, editor, Advances in Cryptology, Springer-Verlag, 1993.
  • [9] Ari Juels and Martin Wattenberg. A Fuzzy Commitment Scheme.
    In ACM Conference on Computer and Communications Security, 1999.
  • [10] Ari Juels and Madhu Sudan. A Fuzzy Vault Scheme.
    In IEEE International Symposium on Information Theory, 2002.
  • [11] U. Uludag and A. K. Jain. Securing Fingerprint Template:
    Fuzzy Vault with Helper Data. In Privacy Research in Vision, 2006.
  • [12] U. Uludag, S. Pankanti, and A. K. Jain. Fuzzy Vault for Fingerprints.
    In Audio- and Video-Based Biometric Person Authentication, 2005.
  • [13] Adi Shamir. How to Share a Secret. Commun. ACM, 1979.