Abstract
Some methods are derived for making faultless keys from faulty data such as iris codes or other analog measurements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ari Juels and Martin Wattenberg. A Fuzzy Commitment Scheme. pp 28–36 in 6th ACM Conference on Computer and Communications Security. 1999.
Fabian Monrose, Michael K. Reiter, Qi Li and Suzanne Wetzel. Cryptographic Key Generation from Voice. in Proc 2001 IEEE Symposium on Security and Privacy. May 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wheeler, D. (2002). Protocols Using Keys from Faulty Data. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2001. Lecture Notes in Computer Science, vol 2467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45807-7_26
Download citation
DOI: https://doi.org/10.1007/3-540-45807-7_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44263-9
Online ISBN: 978-3-540-45807-4
eBook Packages: Springer Book Archive