ileana buhan
ileana buhan
Vahvistettu sähköpostiosoite verkkotunnuksessa ru.nl - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
EJC Kelkboom, J Breebaart, TAM Kevenaar, I Buhan, RNJ Veldhuis
IEEE Transactions on Information Forensics and Security 6 (1), 107-121, 2010
1192010
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1132007
Biometric template protection
J Breebaart, B Yang, I Buhan-Dulman, C Busch
Datenschutz und Datensicherheit-DuD 33 (5), 299-304, 2009
722009
The state of the art in abuse of biometrics
I Buhan, PH Hartel
Centre for Telematics and Information Technology, University of Twente, 2005
432005
Constructing practical fuzzy extractors using qim
I Buhan, J Doumen, P Hartel, R Veldhuis
Centre for Telematics and Information Technology, University of Twente …, 2007
422007
Secure ad-hoc pairing with biometrics: SAfE
I Buhan, J Doumen, P Hartel, R Veldhuis
Proc. IWSSI, 450-456, 2007
332007
Analytical template protection performance and maximum key size given a gaussian-modeled biometric source
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
Biometric Technology for Human Identification VII 7667, 76670D, 2010
292010
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
I Buhan, J Breebaart, J Guajardo, K De Groot, E Kelkboom, T Akkermans
Data Privacy Management and Autonomous Spontaneous Security, 78-92, 2009
292009
Secure pairing with biometrics
I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis
International Journal of Security and Networks 4 (1-2), 27-42, 2009
242009
Efficient strategies to play the indistinguishability game for fuzzy sketches
I Buhan, J Guajardo, E Kelkboom
2010 IEEE International Workshop on Information Forensics and Security, 1-6, 2010
202010
Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
IEEE Transactions on information forensics and security 7 (4), 1225-1241, 2012
182012
Embedding renewable cryptographic keys into continuous noisy data
I Buhan, J Doumen, P Hartel, Q Tang, R Veldhuis
International Conference on Information and Communications Security, 294-310, 2008
182008
A survey of the security and privacy measures for anonymous biometric authentication systems
I Buhan, E Kelkboom, K Simoens
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
162010
Controlling leakage of biometric information using dithering
I Buhan, J Doumen, P Hartel
2008 16th European Signal Processing Conference, 1-5, 2008
152008
Cryptographic keys from noisy data, theory and applications.
I Buhan
University of Twente, Enschede, Netherlands, 2008
132008
Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis
I Buhan, JM Doumen, PH Hartel, RNJ Veldhuis
University of Twente, Netherlands, 2006
132006
Feeling is believing: a secure template exchange protocol
I Buhan, J Doumen, P Hartel, R Veldhuis
International Conference on Biometrics, 897-906, 2007
122007
A systematic appraisal of side channel evaluation strategies
M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ...
International Conference on Research in Security Standardisation, 46-66, 2020
92020
Evaluation of a template protection approach to integrate fingerprint biometrics in a PIN-based payment infrastructure
J Breebaart, I Buhan, K de Groot, E Kelkboom
Electronic Commerce Research and Applications 10 (6), 605-614, 2011
92011
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis.
G Perin, I Buhan, S Picek
IACR Cryptol. ePrint Arch. 2020, 58, 2020
82020
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20