Author of the publication

A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.

, , , , , , , , , , and . BTAS, page 1-7. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results., , , , and . Int. J. Inf. Sec., 12 (6): 439-465 (2013)Zero-Knowledge Sets With Short Proofs., , , and . IEEE Trans. Information Theory, 57 (4): 2488-2502 (2011)Provably Secure Threshold Password-Authenticated Key Exchange., and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 507-523. Springer, (2003)Secure off-the-record messaging., , and . WPES, page 81-89. ACM, (2005)Fully non-interactive onion routing with forward secrecy., , , , and . Int. J. Inf. Sec., 12 (1): 33-47 (2013)Secure Multiplication of Shared Secrets in the Exponent., and . IACR Cryptology ePrint Archive, (2003)Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results., , , and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 101-120. Springer, (2008)Verifiable Pattern Matching on Outsourced Texts., , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 333-350. Springer, (2016)Deniable authentication and key exchange., , and . ACM Conference on Computer and Communications Security, page 400-409. ACM, (2006)A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates., , , , , , , , , and 1 other author(s). BTAS, page 1-7. IEEE, (2010)