Skip to search formSkip to main contentSkip to account menu

Fuzzy extractor

Fuzzy extractors convert biometric data into random strings, which makes it possible to apply cryptographic techniques for biometric security. They… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Bio-cryptography is the combination of biometrics and cryptography that is a new security technology. For the fuzzy of… 
2016
2016
This paper describes an approach to integrate unstructured and structured data and provide a natural language query interface to… 
2015
2015
Distance bounding protocols (DBPs) are security protocols that aim to limit the maximum possible distance between two partners in… 
2013
2013
............................................................................................................................. ii… 
2013
2013
Recently, An pointed out the weaknesses of Das's three-factor remote user authentication scheme, and proposed an improved… 
2010
2010
The spectral minutiae representation is designed for combining fingerprint recognition with template protection. This puts… 
2009
2009
Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it… 
2009
2009
Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it… 
2008
2008
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially… 
2007
2007
Fuzzy extractors are a powerful tool to extract randomness from noisy data. A fuzzy extractor can extract randomness only if the…