Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
36
views
25
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,431
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2011
Secure and Efficient Protocols for Iris and Fingerprint Identification
other
Author(s):
Marina Blanton
,
Paolo Gasti
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Resource Identification
Most cited references
25
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
376
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
311
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
How Iris Recognition Works
J Daugman
(2004)
0
comments
Cited
214
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 190-209
DOI:
10.1007/978-3-642-23822-2_11
SO-VID:
90565c97-ab1a-4084-8d60-c5c3a7bdbff8
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 172
Who Wrote This Code? Identifying the Authors of Program Binaries
pp. 190
Secure and Efficient Protocols for Iris and Fingerprint Identification
pp. 227
DriverGuard: A Fine-Grained Protection on I/O Flows
pp. 278
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
pp. 335
Adapting Helios for Provable Ballot Privacy
pp. 355
Remote Timing Attacks Are Still Practical
pp. 588
Quantitative Information Flow, with a View
pp. 607
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
Similar content
3,431
Electrical Imaging Surveys for Environmental and Engineering Studies. A Practical Guide to 2-D and 3-D Surveys, RES2DINV Manual, IRIS Instruments
Authors:
M. Loke
Iris atropurpurea
Authors:
Y. Sapir
Choroidal neurofibromatosis with congenital iris ectropion and buphthalmos: relationship and significance.
Authors:
J P Burke
,
R J Leitch
,
J F Talbot
…
See all similar
Cited by
11
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
Authors:
Hasini Gunasinghe
,
Elisa Bertino
PassBio: Privacy-Preserving User-Centric Biometric Authentication
Authors:
Kai Zhou
,
Jian Ren
SHADE: Secure HAmming DistancE Computation from Oblivious Transfer
Authors:
Julien Bringer
,
Hervé Chabanne
,
Alain Patey
See all cited by