Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,890,179 papers from all fields of science
Search
Sign In
Create Free Account
Fuzzy extractor
Fuzzy extractors convert biometric data into random strings, which makes it possible to apply cryptographic techniques for biometric security. They…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Adversary (cryptography)
Authentication
Binary entropy function
Binary symmetric channel
Expand
Broader (2)
Biometrics
Coding theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Ternary Fuzzy Extractor for Efficient Cryptographic Key Generation
Kohei Kazumori
,
Rei Ueno
,
N. Homma
IEEE International Symposium on Multiple-Valued…
2019
Corpus ID: 195884626
This paper presents an efficient cryptographic key generation from ternary physically unclonable functions (PUFs). The basic…
Expand
2016
2016
K-Extractor: Automatic Knowledge Extraction for Hybrid Question Answering
Mithun Balakrishna
,
Steven D. Werner
,
M. Tatu
,
T. Erekhinskaya
,
D. Moldovan
International Computer Science Conference
2016
Corpus ID: 15415816
This paper describes an approach to integrate unstructured and structured data and provide a natural language query interface to…
Expand
2015
2015
Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions
Stephan Kleber
,
R. V. D. Heijden
,
Henning Kopp
,
F. Kargl
Networked Systems
2015
Corpus ID: 41313900
Distance bounding protocols (DBPs) are security protocols that aim to limit the maximum possible distance between two partners in…
Expand
2014
2014
Antiangiogenic Effect of Ficus deltoidea Jack Standardised Leaf Extracts
A. Shafaei
,
N. S. Muslim
,
Z. D. Nassar
,
A. Aisha
,
A. Majid
,
Z. Ismail
2014
Corpus ID: 53535760
Purpose: To standardise the methanol and aqueous extracts of Ficus deltoidea leaf by developing a reverse phase high performance…
Expand
2013
2013
Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement
Xiong Li
,
J. Niu
,
M. Khan
,
Junguo Liao
International Symposium on Biometrics and…
2013
Corpus ID: 4051999
Recently, An pointed out the weaknesses of Das's three-factor remote user authentication scheme, and proposed an improved…
Expand
2013
2013
Cryptographic Credentials with Privacy-preserving Biometric Bindings
David Bissessar
2013
Corpus ID: 58100095
............................................................................................................................. ii…
Expand
2009
2009
ANTHELMINTIC ACTIVITY OF CAJANUS SCARABAEOIDES (L).
Suman Pattanayak
,
Pravakar Sharma
,
G. Dama
,
S. S. Nayak
,
D. Panda
2009
Corpus ID: 98759930
Summary Whole plant of Cajanus Scarabaeoides (L) were dried, powdered and successively extracted with petroleum ether, chloroform…
Expand
2009
2009
Extraction of antioxidant compounds from red pitaya using soxhlet extraction method
Wan Nurul Zahida
,
Wan Abdul Jalil
2009
Corpus ID: 92191587
The fruits of Hylocereus cacti, known as red pitaya, have recently drawn much attention of growers worldwide, not only because of…
Expand
2008
2008
Key Distribution for Wireless Sensor Networks and Physical Unclonable Functions
J. Guajardo
,
Sandeep S. Kumar
,
P. Tuyls
2008
Corpus ID: 59471747
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially…
Expand
2007
2007
Constructing practical Fuzzy Extractors using QIM
I. Buhan
,
J. Doumen
,
P. Hartel
,
R. Veldhuis
2007
Corpus ID: 1635404
Fuzzy extractors are a powerful tool to extract randomness from noisy data. A fuzzy extractor can extract randomness only if the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE