|
Search the dblp DataBase
Julien Bringer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
Perturbing and Protecting a Traceable Block Cipher. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:109-119 [Conf]
- Julien Bringer, Hervé Chabanne
On the Wiretap Channel Induced by Noisy Tags. [Citation Graph (0, 0)][DBLP] ESAS, 2006, pp:113-120 [Conf]
- Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
HB++: a Lightweight Authentication Protocol Secure against Some Attacks. [Citation Graph (0, 0)][DBLP] SecPerU, 2006, pp:28-33 [Conf]
- Julien Bringer, Hervé Chabanne, Quoc Dung Do
A fuzzy sketch with trapdoor. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2266-2269 [Journal]
- Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:96-106 [Conf]
- Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:175-193 [Conf]
- Julien Bringer, Hervé Chabanne, Gerad Cohen, Bruno Kindarji, Gilles Zémor
Optimal Iris Fuzzy Sketches [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. [Citation Graph (, )][DBLP]
Cryptanalysis of EC-RAC, a RFID Identification Protocol. [Citation Graph (, )][DBLP]
Efficient zero-knowledge identification schemes which respect privacy. [Citation Graph (, )][DBLP]
Extending Match-On-Card to Local Biometric Identification. [Citation Graph (, )][DBLP]
Error-Tolerant Searchable Encryption. [Citation Graph (, )][DBLP]
Biometric Identification over Encrypted Data Made Feasible. [Citation Graph (, )][DBLP]
On Physical Obfuscation of Cryptographic Algorithms. [Citation Graph (, )][DBLP]
Private Interrogation of Devices via Identification Codes. [Citation Graph (, )][DBLP]
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [Citation Graph (, )][DBLP]
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. [Citation Graph (, )][DBLP]
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. [Citation Graph (, )][DBLP]
An Authentication Protocol with Encrypted Biometric Data. [Citation Graph (, )][DBLP]
Another Look at Extended Private Information Retrieval Protocols. [Citation Graph (, )][DBLP]
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations. [Citation Graph (, )][DBLP]
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [Citation Graph (, )][DBLP]
Identification with Encrypted Biometric Data Made Feasible [Citation Graph (, )][DBLP]
RFID Key Establishment Against Active Adversaries [Citation Graph (, )][DBLP]
Negative Databases for Biometric Data [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|