• Publications
  • Influence
Privacy Weaknesses in Biometric Sketches
TLDR
We present attacks on template protection schemes that can be described as fuzzy sketches based on error-correcting codes. Expand
  • 178
  • 16
  • PDF
A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems
TLDR
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with respect to user and data privacy. Expand
  • 80
  • 4
Criteria towards metrics for benchmarking template protection algorithms
TLDR
Traditional criteria used in biometric performance evaluation do not cover all the performance aspects of biometric template protection and the lack of well-defined metrics inhibits the proper evaluation of such methods. Expand
  • 64
  • 4
A Survey of Authentication and Communications Security in Online Banking
TLDR
A survey was conducted to provide a state of the art of online banking authentication and communications security implementations. Expand
  • 16
  • 3
  • PDF
Dynamic random projection for biometric template protection
TLDR
We propose a dynamic random projection method to alleviate these security concerns due to the stolen token by increasing the computational complexity to search for the unprotected biometric features. Expand
  • 83
  • 1
  • PDF
Secure and Privacy-Friendly Logging for eGovernment Services
TLDR
In this paper we present a scheme for building a logging- trail for processes related to eGovernment services in a privacy-friendly and confidential way. Expand
  • 32
  • 1
  • PDF
A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems
TLDR
The challenge in applying the known information theoretical measures for biometric authentication systems is that on one hand these measures are defined in a specific context and on the other hand there are several constructions known for the protection of biometric information. Expand
  • 12
  • 1
  • PDF
Cross-Context Delegation through Identity Federation
TLDR
We present in this paper a basic scheme for delegation in a federated setting and two more advanced schemes, transferable and corporate delegation. Expand
  • 9
  • 1
  • PDF
Analysis of Biometric Authentication Protocols in the Blackbox Model
TLDR
In this paper we analyze different biometric authentication protocols considering an internal adversary. Expand
  • 3
  • 1
  • PDF
Pseudo Identities Based on Fingerprint Characteristics
TLDR
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. Expand
  • 30
  • PDF