Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,155 papers from all fields of science
Search
Sign In
Create Free Account
Fuzzy extractor
Fuzzy extractors convert biometric data into random strings, which makes it possible to apply cryptographic techniques for biometric security. They…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Adversary (cryptography)
Authentication
Binary entropy function
Binary symmetric channel
Expand
Broader (2)
Biometrics
Coding theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Fingerprint authentication based on fuzzy extractor in the mobile device
Li Li
,
Siqin Zhou
,
Hang Tu
International Journal of Electronic Security and…
2019
Corpus ID: 145958413
Bio-cryptography is the combination of biometrics and cryptography that is a new security technology. For the fuzzy of…
Expand
2016
2016
K-Extractor: Automatic Knowledge Extraction for Hybrid Question Answering
Mithun Balakrishna
,
Steven D. Werner
,
M. Tatu
,
T. Erekhinskaya
,
D. Moldovan
International Computer Science Conference
2016
Corpus ID: 15415816
This paper describes an approach to integrate unstructured and structured data and provide a natural language query interface to…
Expand
2015
2015
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions
Stephan Kleber
,
R. V. D. Heijden
,
Henning Kopp
,
F. Kargl
Networked Systems
2015
Corpus ID: 41313900
Distance bounding protocols (DBPs) are security protocols that aim to limit the maximum possible distance between two partners in…
Expand
2013
2013
Cryptographic Credentials with Privacy-preserving Biometric Bindings
David Bissessar
2013
Corpus ID: 58100095
............................................................................................................................. ii…
Expand
2013
2013
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement
Xiong Li
,
J. Niu
,
M. Khan
,
Junguo Liao
International Symposium on Biometrics and…
2013
Corpus ID: 4051999
Recently, An pointed out the weaknesses of Das's three-factor remote user authentication scheme, and proposed an improved…
Expand
2010
2010
Complex spectral minutiae representation for fingerprint recognition
Hai-yun Xu
,
R. Veldhuis
IEEE Computer Society Conference on Computer…
2010
Corpus ID: 7063051
The spectral minutiae representation is designed for combining fingerprint recognition with template protection. This puts…
Expand
2009
2009
A Fuzzy Extractor Based on Smooth Entropy
Bo Yang
,
Aidong Sun
,
Wenzheng Zhang
Communication Systems and Applications
2009
Corpus ID: 17707582
Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it…
Expand
2009
2009
A fully robust fuzzy extractor
Yang Bo
,
Aidong Sun
,
Wenzheng Zhang
International Conference on Cyber-Enabled…
2009
Corpus ID: 6451707
Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it…
Expand
2008
2008
Key Distribution for Wireless Sensor Networks and Physical Unclonable Functions
J. Guajardo
,
Sandeep S. Kumar
,
P. Tuyls
2008
Corpus ID: 59471747
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially…
Expand
2007
2007
Constructing practical Fuzzy Extractors using QIM
I. Buhan
,
J. Doumen
,
P. Hartel
,
R. Veldhuis
2007
Corpus ID: 1635404
Fuzzy extractors are a powerful tool to extract randomness from noisy data. A fuzzy extractor can extract randomness only if the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE