<--- Back to Details
First PageDocument Content
Cryptography / Biometrics / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key
Date: 2010-10-23 12:03:49
Cryptography
Biometrics
Coding theory
Fuzzy extractor
Private biometrics
Error detection and correction
Password
Public key fingerprint
Cyclic redundancy check
Cryptographic hash function
Matching
Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Download Document from Source Website

File Size: 429,32 KB

Share Document on Facebook

Similar Documents

Lecture 9: Tues Feb 14: Superdense Coding OK, now on to some new stuff! Superdense Coding is the first protocol we’ll see that requires entanglement. Basic information theory (Shannon) tells us that “by sending bits,

Lecture 9: Tues Feb 14: Superdense Coding OK, now on to some new stuff! Superdense Coding is the first protocol we’ll see that requires entanglement. Basic information theory (Shannon) tells us that “by sending bits,

DocID: 1xVqR - View Document

QcBits: constant-time small-key code-based cryptography Tung Chou Technische Universiteit Eindhoven, The Netherlands  Coding theory

QcBits: constant-time small-key code-based cryptography Tung Chou Technische Universiteit Eindhoven, The Netherlands Coding theory

DocID: 1vexc - View Document

a Cimpa-ICTP research school on Lattices and application to cryptography and coding theory Saigon University, Ho Chi Minh City, August 1st-12th 2016 International Participants 1 Ankur

a Cimpa-ICTP research school on Lattices and application to cryptography and coding theory Saigon University, Ho Chi Minh City, August 1st-12th 2016 International Participants 1 Ankur

DocID: 1uNEl - View Document

Preventing Pollution Attacks in Multi-Source Network Coding Dan Boneh† Stanford University, USA   Shweta Agrawal∗

Preventing Pollution Attacks in Multi-Source Network Coding Dan Boneh† Stanford University, USA Shweta Agrawal∗

DocID: 1uibH - View Document