Publications

30 / 3,612 publications found.


  •  Wang, Y., Rane, S.D., Vetro, A., "Leveraging Reliable Bits: ECC Design Considerations for Practical Secure Biometric Systems", IEEE International Workshop on Information Forensics and Security (WIFS), DOI: 10.1109/​WIFS.2009.5386479, December 2009, pp. 71-75.
    BibTeX TR2009-074 PDF
    • @inproceedings{Wang2009dec,
    • author = {Wang, Y. and Rane, S.D. and Vetro, A.},
    • title = {Leveraging Reliable Bits: ECC Design Considerations for Practical Secure Biometric Systems},
    • booktitle = {IEEE International Workshop on Information Forensics and Security (WIFS)},
    • year = 2009,
    • pages = {71--75},
    • month = dec,
    • doi = {10.1109/WIFS.2009.5386479},
    • url = {https://www.merl.com/publications/TR2009-074}
    • }
  •  Rane, S.D., Sun, W., Vetro, A., "Secure Function Evaluation Based on Secret Sharing and Homomorphic Encryption", Allerton Conference on Communication, Control, and Computing, DOI: 10.1109/​ALLERTON.2009.5394944, September 2009, pp. 827-834.
    BibTeX TR2009-084 PDF
    • @inproceedings{Rane2009sep,
    • author = {Rane, S.D. and Sun, W. and Vetro, A.},
    • title = {Secure Function Evaluation Based on Secret Sharing and Homomorphic Encryption},
    • booktitle = {Allerton Conference on Communication, Control, and Computing},
    • year = 2009,
    • pages = {827--834},
    • month = sep,
    • doi = {10.1109/ALLERTON.2009.5394944},
    • url = {https://www.merl.com/publications/TR2009-084}
    • }
  •  Vetro, A., Draper, S., Rane, S., Yedidia, J., "Securing Biometric Data" in Distributed Source Coding, Dragotti, P.L. and Gastpar, M., Eds., Elsevier, January 2009.
    BibTeX TR2009-002 PDF
    • @incollection{Vetro2009jan,
    • author = {Vetro, A. and Draper, S. and Rane, S. and Yedidia, J.},
    • title = {Securing Biometric Data},
    • booktitle = {Distributed Source Coding},
    • year = 2009,
    • editor = {Dragotti, P.L. and Gastpar, M.},
    • month = jan,
    • publisher = {Elsevier},
    • isbn = {978-0-12-374485-2},
    • url = {https://www.merl.com/publications/TR2009-002}
    • }
  •  Sutcu, Y., Rane, S., Yedidia, J.S., Draper, S.C., Vetro, A., "Feature Extraction for a Slepian-Wolf Biometric System Using LDPC Codes", IEEE International Symposium on Information Theory (ISIT), July 2008.
    BibTeX TR2008-036 PDF
    • @inproceedings{Sutcu2008jul,
    • author = {Sutcu, Y. and Rane, S. and Yedidia, J.S. and Draper, S.C. and Vetro, A.},
    • title = {Feature Extraction for a Slepian-Wolf Biometric System Using LDPC Codes},
    • booktitle = {IEEE International Symposium on Information Theory (ISIT)},
    • year = 2008,
    • month = jul,
    • url = {https://www.merl.com/publications/TR2008-036}
    • }
  •  Sutcu, Y., Rane, S., Yedidia, J.S., Draper, S.C., Vetro, A., "Feature Transformation of Biometric Templates for Secure Biometric Systems based on Error Correcting Codes", IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2008.
    BibTeX TR2008-029 PDF
    • @inproceedings{Sutcu2008jun,
    • author = {Sutcu, Y. and Rane, S. and Yedidia, J.S. and Draper, S.C. and Vetro, A.},
    • title = {Feature Transformation of Biometric Templates for Secure Biometric Systems based on Error Correcting Codes},
    • booktitle = {IEEE Conference on Computer Vision and Pattern Recognition (CVPR)},
    • year = 2008,
    • month = jun,
    • url = {https://www.merl.com/publications/TR2008-029}
    • }