Reconstructing a fragmented face from a cryptographic identification protocol.
Andy LuongMichael GerbushBrent WatersKristen GraumanPublished in: WACV (2013)
Keyphrases
- cryptographic protocols
- security protocols
- person identification
- smart card
- security properties
- packet filtering
- lightweight
- cryptographic algorithms
- face images
- secure communication
- human faces
- authentication protocol
- human identification
- security analysis
- privacy preserving
- homomorphic encryption
- biometric systems
- network security
- biometric data
- biometric identification
- real time