Baldi M, Bianchi M, Chiaraluce F, Rosenthal J, Schipani D (2011) On fuzzy syndrome hashing with LDPC coding. In: Proceeding of 4th international sympoisum applied sciences in biomedical and communication technologies (ISABEL), pp 1–5
Google Scholar
Choi WY, Lee S, Moon D, Chung Y, Moon KY (2008) A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault. IEICE Electron Express 5(18):725–731
CrossRef
Google Scholar
Clancy C (2003) Secure smartcard-based fingerprint authentication. In: ACM Workshop on biometrics: methods and applications, pp 45–52
Google Scholar
Fontein F, Marshall K, Rosenthal J, Schipani D, Trautmann AL (2012) On burst error correction and storage security of noisy data. In: Proceeding 20th international symposium mathematical theory of networks and systems (MTNS)
Google Scholar
Gorla E, Manganiello F, Rosenthal J (2012) An algebraic approach for decoding spread codes. Adv Math Commun (AMC) 6(4):443–466
MATH
MathSciNet
CrossRef
Google Scholar
Hartloff J, Bileschi M, Tulyakov S, Dobler J, Rudra A, Govindaraju V (2013) Security analysis for fingerprint fuzzy vaults. In: SPIE defense, security and sensing
Google Scholar
Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Crypt 38(2):237–257
MATH
MathSciNet
CrossRef
Google Scholar
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceeding 6th ACM conference on computer and communications security, CCS ’99, pp 28–36
Google Scholar
Koetter R, Kschichang F (2007) Coding for errors and erasures in random network coding. In Proceeding of IEEE international symposium, information theory
Google Scholar
Laksov D, Thorup A (1994) Counting matrices with coordinates in finite fields and of fixed rank. Mathematica Scandinavica 74:19–33
MATH
MathSciNet
Google Scholar
Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220
CrossRef
Google Scholar
MacWilliams FJ, Sloane N (1977) The Theory of Error-Correcting Codes. North Holland, Amsterdam
Google Scholar
Manganiello F, Gorla E, Rosenthal J (2008) Spread codes and spread decoding in network coding. In: Proceeding of IEEE international symposium information theory, pp 881–885
Google Scholar
Manganiello F, Trautmann A-L (2014) Spread decoding in extension fields. Finite Fields Appl 25:94–105
MATH
MathSciNet
CrossRef
Google Scholar
Mihailescu P, Munk A, Tams B (2009) The fuzzy vault for fingerprints is vulnerable to brute force attack. In: Proceeding of BIOSIG, pp 43–54
Google Scholar
Poon HT, Miri A (2012) On efficient decoding for the fuzzy vault scheme. In: IEEE 11th International conference information science signal processing and their application, pp 454–459
Google Scholar
Schipani D, Rosenthal J (2010) Coding solutions for the secure biometric storage problem. In: Information theory workshop (ITW), 2010 IEEE, Dublin, Ireland, pp 1–4
Google Scholar