Author of the publication

New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.

, , , , , and . BIOSIG, volume P-212 of LNI, page 171-184. GI, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ohki, Tetsushi
add a person with the name Ohki, Tetsushi
 

Other publications of authors with the same name

On Trust Confusional, Trust Ignorant, and Trust Transitions., , , , , and . IFIPTM, volume 563 of IFIP Advances in Information and Communication Technology, page 178-195. Springer, (2019)New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems., , , , , and . BIOSIG, volume P-212 of LNI, page 171-184. GI, (2013)A metric of identification performance of biometrics based on information content., , , and . ICARCV, page 1274-1279. IEEE, (2010)Micro Disposable Biometric Authentication: An Application Using Fingernail Minute Textures for Nonsensitive Services., , , , and . ICBSP, page 68-73. ACM, (2018)Automatic Examination-Based Whitelist Generation for XSS Attack Detection., , , , and . BWCCA, volume 25 of Lecture Notes on Data Engineering and Communications Technologies, page 326-338. Springer, (2018)Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification., , , , , and . IEEE Access, (2019)Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme., , and . BIOSIG, volume P-196 of LNI, page 1-6. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.PDH : Probabilistic Deep Hashing Based on Map Estimation of Hamming Distance., , , , and . ICIP, page 2229-2233. IEEE, (2019)Examining of Shallow Autoencoder on Black-box Attack against Face Recognition., , , and . APSIPA ASC, page 1775-1780. IEEE, (2021)Synthesizing Privacy-Preserving Location Traces Including Co-locations., , , , and . DPM/CBT@ESORICS, volume 13140 of Lecture Notes in Computer Science, page 20-36. Springer, (2021)