Follow
ileana buhan
Title
Cited by
Cited by
Year
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
EJC Kelkboom, J Breebaart, TAM Kevenaar, I Buhan, RNJ Veldhuis
IEEE Transactions on Information Forensics and Security 6 (1), 107-121, 2010
1322010
Fuzzy extractors for continuous distributions
I Buhan, J Doumen, P Hartel, R Veldhuis
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1212007
Biometric template protection
J Breebaart, B Yang, I Buhan-Dulman, C Busch
Datenschutz und Datensicherheit-DuD 33 (5), 299-304, 2009
812009
Constructing practical fuzzy extractors using qim
I Buhan, J Doumen, P Hartel, R Veldhuis
Centre for Telematics and Information Technology, University of Twente …, 2007
462007
The state of the art in abuse of biometrics
I Buhan, PH Hartel
Centre for Telematics and Information Technology, University of Twente, 2005
462005
A systematic appraisal of side channel evaluation strategies
M Azouaoui, D Bellizia, I Buhan, N Debande, S Duval, C Giraud, ...
Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020
352020
Secure ad-hoc pairing with biometrics: SAfE
I Buhan, J Doumen, P Hartel, R Veldhuis
Proc. IWSSI, 450-456, 2007
342007
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
I Buhan, J Breebaart, J Guajardo, K de Groot, E Kelkboom, T Akkermans
Data Privacy Management and Autonomous Spontaneous Security: 4th …, 2010
312010
SoK: Design tools for side-channel-aware implementations
I Buhan, L Batina, Y Yarom, P Schaumont
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
302022
Analytical template protection performance and maximum key size given a gaussian-modeled biometric source
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
Biometric Technology for Human Identification VII 7667, 119-130, 2010
302010
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis
G Perin, I Buhan, S Picek
Cryptology ePrint Archive, 2020
28*2020
Secure pairing with biometrics
I Buhan, B Boom, J Doumen, PH Hartel, RNJ Veldhuis
International Journal of Security and Networks 4 (1-2), 27-42, 2009
262009
Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources
EJC Kelkboom, J Breebaart, I Buhan, RNJ Veldhuis
IEEE Transactions on information forensics and security 7 (4), 1225-1241, 2012
222012
Efficient strategies to play the indistinguishability game for fuzzy sketches
I Buhan, J Guajardo, E Kelkboom
2010 IEEE International Workshop on Information Forensics and Security, 1-6, 2010
202010
A survey of the security and privacy measures for anonymous biometric authentication systems
I Buhan, E Kelkboom, K Simoens
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
192010
Embedding renewable cryptographic keys into continuous noisy data
I Buhan, J Doumen, P Hartel, Q Tang, R Veldhuis
Information and Communications Security: 10th International Conference …, 2008
182008
Controlling leakage of biometric information using dithering
I Buhan, J Doumen, P Hartel
2008 16th European Signal Processing Conference, 1-5, 2008
152008
Cryptographic keys from noisy data, theory and applications.
I Buhan
University of Twente, Enschede, Netherlands, 2008
132008
Feeling is Believing: a location limited channel based on grip pattern biometrics and cryptanalysis
I Buhan, JM Doumen, PH Hartel, RNJ Veldhuis
University of Twente, Netherlands, 2006
132006
Feeling is believing: a secure template exchange protocol
I Buhan, J Doumen, P Hartel, R Veldhuis
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
122007
The system can't perform the operation now. Try again later.
Articles 1–20