[1] 冯 全, 苏 菲, 蔡安妮. 生物加密综述[J]. 计算机工程, 2008, 34(10): 141-143. [2] Feng Quan, Su Fei, Cai Anni. Secure Remote Authentication Using Fingerprint and Fuzzy Private Matching[C]//Proc. of IISA’09. Qingdao, China: Academy Publisher, 2009. [3] Erkin Z, Franz M, Guajardo J, et al. Privacy-preserving Face Recognition[C]//Proc. of PETS’09. Berlin, Germany: Springer- Verlag, 2009. [4] Sadeghi A R, Schneider T, Wehrenberg I. Efficient Privacy- preserving Face Recognition[C]//Proc. of ICISC’09. Seoul, Korea: Springer, 2009. [5] Barni M, Bianchi T, Catalano D, et al. Privacy-preserving Finger- code Authentication[C]//Proc. of 2010 ACM Workshop on Multimedia and Security. Rome, Italy: ACM Press, 2010. [6] Huang Yan, Malka L, Evans D, et al. Efficient Privacy-preserving Biometric Identification[C]//Proc. of NDSS’11. San Diego, USA: [s. n.], 2011.
[7] Freedman M, Nissim K, Pinkas B. Efficient Private Matching and Set Intersection[C]//Proc. of Eurocrypt’04. Interlaken, Switzerland: [s. n.], 2004: 1-19. [8] Kissner L, Song D. Privacy-preserving Set Operations[C]//Proc. of CRYPTO’05. Santa Barbara, California, USA: [s. n.], 2005. [9] Hazay C, Lindell Y. Constructions of Truly Practical Secure Protocols Using Standard Smartcards[C]//Proc. of CCS’08. Alexandria, USA: ACM Press, 2008. [10] Fischlin M, Pinkas B, Sadeghi A R. Secure Set Intersection with Untrusted Hardware Tokens[C]//Proc. of CT-RSA’11. Berlin, Germany: Springer, 2011. [11] 冯 全. 基于指纹的隐私保护型身份认证技术[D]. 北京: 北京邮电大学, 2010. [12] Pankanti S, Prabhakar S, Jain A K. On the Individuality of Fingerprints[J]. IEEE Trans. on PAMI, 2002, 24(8): 1010-1025. [13] Janson P, Tsudik G. Secure and Minimal Protocols for Authen- ticated Key Distribution[J]. Computer Communications, 1995, 18(9): 645-653.
|