Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Kevin Thiry-Atighehchi"'
Publikováno v:
SECRYPT
SECRYPT, Jul 2022, Lisbon, Portugal. pp.568-573, ⟨10.5220/0011277100003283⟩
SECRYPT, Jul 2022, Lisbon, Portugal. pp.568-573, ⟨10.5220/0011277100003283⟩
Cancelable biometric schemes aim at generating secure biometric templates by combining user specific tokens, such as password, stored secret or salt, along with biometric data. This type of transformation is constructed as a composition of a biometri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6dd025b37ef5ed335515c3bc4b9df3e6
Publikováno v:
The 2nd Tokenomics Conference on Blockchain Economics, Security and Protocols
The 2nd Tokenomics Conference on Blockchain Economics, Security and Protocols, Oct 2020, Toulouse, France
HAL
The 2nd Tokenomics Conference on Blockchain Economics, Security and Protocols, Oct 2020, Toulouse, France
HAL
International audience; Our aim is to change the Proof of Work paradigm. Instead of wasting energy in dummy computations 15 with hash computations, we propose a new approach based on the behavior of the users. Our idea 16 is to design a mechanism tha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b7b288326c966295412a06e7b0128c78
https://hal.science/hal-02559573/document
https://hal.science/hal-02559573/document
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2020, 15, pp.2869-2880. ⟨10.1109/TIFS.2020.2977533⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2020, 15, pp.2869-2880. ⟨10.1109/TIFS.2020.2977533⟩
Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy in matching. In this paper, w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ca756ea820c6ae0a8c2dbc9c9556db8a
Publikováno v:
IEEE Transactions on Information Forensics & Security; 2020, Vol. 15, p2869-2880, 12p