| Cited in | International search | Type: | Non-patent literature | Publication information: | [XP] JULIEN BRINGER ET AL: "Faster secure computation for biometric identification using filtering", BIOMETRICS (ICB), 2012 5TH IAPR INTERNATIONAL CONFERENCE ON, IEEE, 29 March 2012 (2012-03-29), pages 257 - 264, XP032215584, ISBN: 978-1-4673-0396-5, DOI: 10.1109/ICB.2012.6199817 [XP] 1-17 * the whole document * | DOI: | http://dx.doi.org/10.1109/ICB.2012.6199817 | Type: | Non-patent literature | Publication information: | [YA] JULIEN BRINGER ET AL: "Extended Private Information Retrieval and Its Application in Biometrics Authentications", 8 December 2007, CRYPTOLOGY AND NETWORK SECURITY; [LECTURE NOTES IN COMPUTER SCIENCE], SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 175 - 193, ISBN: 978-3-540-76968-2, XP019083964 [Y] 1-12,14-17 * paragraph [0002] - paragraph [0005] *[A] 13 | Type: | Non-patent literature | Publication information: | [YA] MARINA BLANTON ET AL: "Secure and Efficient Protocols for Iris and Fingerprint Identification", INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH,, vol. 20110917:024955, 17 September 2011 (2011-09-17), pages 1 - 25, XP061004601 [Y] 1-12,14-17 * paragraph [0001] - paragraph [0005] * * figure 5 *[A] 13 | Type: | Non-patent literature | Publication information: | [A] BRINGER JULIEN ET AL: "Identification with Encrypted Biometric Data", 7 September 2009 (2009-09-07), XP055047128, Retrieved from the Internet [retrieved on 20121207] [A] 1-17 * paragraph [0004] - paragraph [0006] * | Type: | Non-patent literature | Publication information: | [A] AHMAD-REZA SADEGHI ET AL: "Efficient Privacy-Preserving Face Recognition", 2 December 2009, INFORMATION, SECURITY AND CRYPTOLOGY ICISC 2009, SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 229 - 244, ISBN: 978-3-642-14422-6, XP019147094 [A] 1-17 * paragraph [0003] * | Type: | Non-patent literature | Publication information: | [A] ZHIHONG ZENG ET AL: "Local Feature Hashing for face recognition", BIOMETRICS: THEORY, APPLICATIONS, AND SYSTEMS, 2009. BTAS '09. IEEE 3RD INTERNATIONAL CONFERENCE ON, IEEE, PISCATAWAY, NJ, USA, 28 September 2009 (2009-09-28), pages 1 - 8, XP031570247, ISBN: 978-1-4244-5019-0 [A] 1-17 * paragraph [0III] * | DOI: | http://dx.doi.org/10.1109/BTAS.2009.5339013 | Type: | Non-patent literature | Publication information: | [A] YAN HUANG ET AL: "Efficient Secure Computation with Garbled Circuits", 1 January 2011, INFORMATION SYSTEMS SECURITY, SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 28 - 48, ISBN: 978-3-642-25559-5, XP019169391 [A] 1-17 * paragraph [0002] * * page 3.4 * | DOI: | http://dx.doi.org/10.1007/978-3-642-25560-1_2 | Cited in | by applicant | Type: | Non-patent literature | Publication information: | Z. ERKIN; M. FRANZ; J. GUAJARDO; S. KATZENBEISSER; LAGENDIJK; T. TOFT: "Privacy-preservinq face recoanition", PRIVACY ENHANCING TECHNOLOGIES, 2009 [XP] 1-17 * the whole document * | Type: | Non-patent literature | Publication information: | A. C.-C. YAO: "How to aenerate and exchanae secrets (extended abstract", FOCS, 1986 [Y] 1-12,14-17 * paragraph [0002] - paragraph [0005] *[A] 13 | Type: | Non-patent literature | Publication information: | A.-R. SADEGHI; T. SCHNEIDER; WEHRENBERG: "Efficient privacv- preservina face recoanition", ICISC, 2009 [Y] 1-12,14-17 * paragraph [0001] - paragraph [0005] * * figure 5 *[A] 13 | Type: | Non-patent literature | Publication information: | F. HAO; J. DAUGMAN; P. ZIELINSKI: "A fast search alaorithm for a larae fuzzy database", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 3, no. 2, 2008 [A] 1-17 * paragraph [0004] - paragraph [0006] * | Type: | Non-patent literature | Publication information: | J. DAUGMAN: "How Iris Recoanition Works", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, vol. 14, no. 1, January 2004 (2004-01-01) |