Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Jump to: 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005
Number of items: 21.

2012

Kelkboom, E.J.C. and Breebaart, J. and Buhan, I.R. and Veldhuis, R.N.J. (2012) Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources. IEEE Transactions on information forensics and security, 7 (4). pp. 1225-1241. ISSN 1556-6013

2011

Kelkboom, Emile J.C. and Breebaart, Jeroen and Kevenaar, Tom A.M. and Buhan, Ileana and Veldhuis, Raymond N.J. (2011) Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme. IEEE Transactions on Information Forensics and Security, 6 (1). pp. 107-121. ISSN 1556-6013

2010

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2010) Embedding renewable cryptographic keys into noisy data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262

Kelkboom, Emile J.C. and Breebaart, Jeroen and Buhan, Ileana and Veldhuis, Raymond N.J. (2010) Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source. In: Biometric Technology for Human Identification VII. Proceedings of SPIE, 7667 (76670D). SPIE--The International Society for Optical Engineering, Bellingham, WA, pp. 1-12. ISBN 9780819481313

2009

Buhan, I.R. and Boom, B.J. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2009) Secure pairing with biometrics. International Journal of Security and Networks, 4 (1/2). pp. 27-42. ISSN 1747-8405

2008

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Tang, Qiang and Veldhuis, Raymond (2008) Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In: 10th International Conference on Information and Communications Security, ICICS, October 20-22, 2008, Birmingham, UK (pp. pp. 294-310).

Buhan, Ileana Rozalia (2008) Cryptographic keys from noisy data, theory and applications. thesis.

Buhan, I.R. (2008) A New Secure Pairing Protocol using Biometrics. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter (2008) Controlling Leakage Of Biometric Information Using Dithering. In: 16th European Signal Processing Conference, EUSIPCO, 25-29 August 2008, Lausanne, Switzerland.

2007

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Veldhuis, R.N.J. (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. In: First International Workshop on Security for Spontaneous Interaction, 16. September 2007, Innsbruck, Austria (pp. pp. 450-456).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Secure Ad-hoc Pairing with Biometrics: SAfE. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Feeling Is Believing: A Secure Template Exchange Protocol. In: International Conference on Biometrics, ICB 2007, August 27-29, 2007, Seoul, Korea (pp. pp. 897-906).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) A unifying view on template protection schemes. In: 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands (pp. pp. 353-42).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) Constructing practical Fuzzy Extractors using QIM. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2007) From Watermarks to Fuzzy Extractors: a Practical Construction. [Report]

2006

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS, 20-22 March 2007, Singapore (pp. pp. 353-355).

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis. [Report]

Buhan, Ileana and Doumen, Jeroen and Hartel, Pieter and Veldhuis, Raymond (2006) Fuzzy extractors for continuous distributions. [Report]

2005

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A False Rejection Oriented Threat Model for the Design of Biometric Authentication Systems. In: International Conference on Biometrics, ICB, January 5 - 7, 2006, Hong Kong, China (pp. pp. 728-736).

Buhan, Ileana and Bazen, Asker and Hartel, Pieter and Veldhuis, Raymond (2005) A false rejection oriented threat model for the design of biometric authentication systems. [Report]

Buhan, Ileana and Hartel, Pieter (2005) The state of the art in abuse of biometrics. [Report]

This list was generated on Mon Oct 20 05:14:09 2014 CEST.