Benjamin Tams

According to our database1, Benjamin Tams authored at least 21 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-biometrische Kryptosysteme.
Datenschutz und Datensicherheit, 2023

Multi-Biometric Fuzzy Vault based on Face and Fingerprints.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
State of the Art of Quality Assessment of Facial Images.
CoRR, 2022

Deep face fuzzy vault: Implementation and performance.
Comput. Secur., 2022

Fusion of Face Demorphing and Deep Face Representations for Differential Morphing Attack Detection.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022

2020
Die Bedeutung qualitätsgesicherter biometrischer Daten für das EU Einreise-/Ausreisesystem (EES).
Datenschutz und Datensicherheit, 2020

Simulation of Print-Scan Transformations for Face Images based on Conditional Adversarial Networks.
Proceedings of the BIOSIG 2020, 2020

2017
Perfect fingerprint orientation fields by locally adaptive global models.
IET Biom., 2017

Xtarp: Improving the Tented Arch Reference Point Detection Algorithm.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

2016
Unlinkable minutiae-based fuzzy vault for multiple fingerprints.
IET Biom., 2016

Unlinkable improved multi-biometric iris fuzzy vault.
EURASIP J. Inf. Secur., 2016

2015
Security Considerations in Minutiae-Based Fuzzy Vaults.
IEEE Trans. Inf. Forensics Secur., 2015

Preventing the cross-matching attack in bloom filter-based.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features.
Proceedings of the BIOSIG 2015, 2015

2014
Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms.
CoRR, 2014

Towards efficient privacy-preserving two-stage identification for fingerprint-based biometric cryptosystems.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

2013
Cryptanalysis of the Fuzzy Vault for Fingerprints: Vulnerabilities and Countermeasures.
PhD thesis, 2013

Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems
CoRR, 2013

Security of the Improved Fuzzy Vault Scheme in the Presence of Record Multiplicity (Full Version).
CoRR, 2013

Absolute Fingerprint Pre-Alignment in Minutiae-Based Cryptosystems.
Proceedings of the 2013 BIOSIG, 2013

2009
The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack.
Proceedings of the BIOSIG 2009, 2009


  Loading...