ileana buhan
Title
Cited by
Cited by
Year
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
EJC Kelkboom, J Breebaart, TAM Kevenaar, I Buhan, RNJ Veldhuis
IEEE Transactions on Information Forensics and Security 6 (1), 107-121, 2010
1072010
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1072007
Biometric template protection
J Breebaart, B Yang, I Buhan-Dulman, C Busch
Datenschutz und Datensicherheit-DuD 33 (5), 299-304, 2009
602009
The state of the art in abuse of biometrics
I Buhan, PH Hartel
Centre for Telematics and Information Technology, University of Twente, 2005
402005
Constructing practical fuzzy extractors using qim
I Buhan, J Doumen, P Hartel, R Veldhuis
Centre for Telematics and Information Technology, University of Twente …, 2007
392007
Secure ad-hoc pairing with biometrics: SAfE
I Buhan, J Doumen, P Hartel, R Veldhuis
Proc. IWSSI, 450-456, 2007
312007
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
I Buhan, J Breebaart, J Guajardo, K De Groot, E Kelkboom, T Akkermans
Data Privacy Management and Autonomous Spontaneous Security, 78-92, 2009
292009
Analytical template protection performance and maximum key size given a gaussian-modeled biometric source
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
Biometric Technology for Human Identification VII 7667, 76670D, 2010
272010
Secure pairing with biometrics
I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis
International Journal of Security and Networks 4 (1-2), 27-42, 2009
252009
Efficient strategies to play the indistinguishability game for fuzzy sketches
I Buhan, J Guajardo, E Kelkboom
2010 IEEE International Workshop on Information Forensics and Security, 1-6, 2010
202010
Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
IEEE Transactions on information forensics and security 7 (4), 1225-1241, 2012
172012
Embedding renewable cryptographic keys into continuous noisy data
I Buhan, J Doumen, P Hartel, Q Tang, R Veldhuis
International Conference on Information and Communications Security, 294-310, 2008
172008
A survey of the security and privacy measures for anonymous biometric authentication systems
I Buhan, E Kelkboom, K Simoens
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
152010
Controlling leakage of biometric information using dithering
I Buhan, J Doumen, P Hartel
2008 16th European Signal Processing Conference, 1-5, 2008
142008
Cryptographic keys from noisy data, theory and applications.
I Buhan
University of Twente, Enschede, Netherlands, 2008
132008
Feeling is believing: a secure template exchange protocol
I Buhan, J Doumen, P Hartel, R Veldhuis
International Conference on Biometrics, 897-906, 2007
122007
Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis
I Buhan, JM Doumen, PH Hartel, RNJ Veldhuis
University of Twente, Netherlands, 2006
102006
Evaluation of a template protection approach to integrate fingerprint biometrics in a PIN-based payment infrastructure
J Breebaart, I Buhan, K de Groot, E Kelkboom
Electronic Commerce Research and Applications 10 (6), 605-614, 2011
82011
A quantitative analysis of crossmatching resilience for a continuous-domain biometric encryption technique
I Buhan, J Breebaart, J Guajardo, K de Groot, E Kelkboom, T Akkermans
First International Workshop on Signal Processing in the EncryptEd Domain …, 2009
82009
Constructing practical fuzzy extractors using QIM, Centre for Telematics and Information Technology, University of Twente
IR Buhan, JM Doumen, PH Hartel, RNJ Veldhuis
Enschede, Technical Report TR-CTIT-07-52, 2007
82007
The system can't perform the operation now. Try again later.
Articles 1–20