<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Manuel Bernardo Barbosa</style></author><author><style face="normal" font="default" size="100%">Thierry Brouard</style></author><author><style face="normal" font="default" size="100%">Stéphane Cauchie</style></author><author><style face="normal" font="default" size="100%">Simão Melo de Sousa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure Biometric Authentication with Improved Accuracy</style></title><secondary-title><style face="normal" font="default" size="100%">13th Australasian Conference on Information Security and Privacy - ACISP</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="default" size="100%">https://haslab.uminho.pt/sites/default/files/mbb/files/302.pdf</style></url></related-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Wollongong, Australia</style></pub-location><volume><style face="normal" font="default" size="100%">5107</style></volume><pages><style face="normal" font="default" size="100%">21-36</style></pages><isbn><style face="normal" font="default" size="100%">978-3-540-69971-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme.&lt;/p&gt;
</style></abstract></record></records></xml>