Private biometrics

Known as: BioCryptics, Biometric encryption 
A form of biometrics, also called Biometric Encryption or BioCryptics, in which the prover is protected against the misuse of template data by a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Acknowledgements The authors would like to express their gratitude to Jean-Christophe Fondeur for helpful discussions and for… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2014
2014
Protection of private key is the most critical part in public key infrastructure (PKI) system since it depends on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
2009
2009
The Public Key Infrastructure (PKI) provides an excellent security for e-transactions and other applications all over the world… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could… (More)
  • table 1
  • figure 1
Is this relevant?
2009
2009
Security issues of Biometric Encryption are discussed in terms of resilience to the attacks. A number of previously unpublished… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
.................................................................................................................... 1 Background… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In developing secure applications and systems, the designers often must incorpomte secure user identifi­ cation in the design… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?