Next: About this document ...
Up: Toward Speech-Generated Cryptographic Keys
Previous: Acknowledgements
- 1
- D. Bleichenbacher. Encoding schemes for generating keys from a low-entropy noisy source, 2002.
- 2
- D. Bleichenbacher and P. Nguyen. Noisy polynomial
interpolation and noisy Chinese remaindering. In Advances in
Cryptology - Proceedings of EUROCRYPT '2000 (LNCS 1807),
Springer-Verlag, pages 53-69, 2000.
- 3
- P. Bohannon, M. Jakobsson, and S. Srikwan.
Cryptographic approaches to privacy in DNA databases. In
Proceedings of the 2000 International Workshop on Practice and Theory
in Public Key Cryptography, January 2000.
- 4
- G. I. Davida, Y. Frankel, and B. J. Matt. On
enabling secure applications through off-line biometric
identification. In Proceedings of the 1998 IEEE Symposium on
Security and Privacy, pages 148-157, May 1998.
- 5
- R. B. Davies. A matrix library in C++.
September 1997. https://www.webnx.com/robert.
- 6
- G. R. Doddington, W. Liggett, A. F. Martin,
M. Przybocki, and D. A. Reynolds. Sheep, goats, lambs and wolves: A
statistical analysis of speaker performance in the NIST 1998 speaker
recognition evaluation. In Proceedings of the
International Conference on Spoken Language Processing, November
1998.
- 7
- C. Ellison, C. Hall, R. Milbert, and B. Schneier.
Protecting secret keys with personal entropy.
Future Generation Computer Systems 16:311-318, 2000.
- 8
- D. Genoud and G. Chollet. Speech pre-processing
against intentional imposture in speaker recognition. In
Proceedings of the 1998 International Conference on Spoken Language
Processing, pages 105-108, December 1998.
- 9
- A. Juels and M. Wattenberg. A fuzzy commitment scheme.
In Proceedings of the ACM Conference on Computer and
Communication Security, pages 28-36, November 1999.
- 10
- Frederick Jelinek. Statistical Methods for Speech
Recognition. MIT Press, 1997.
- 11
- J. B. Lacy, D. P. Mitchell, and
W. M. Schell. CryptoLib: cryptography in software. In Proceedings of
the UNIX Security Symposium, Oct. 1993.
- 12
- M. Lee, D. P. Lopresti and J. P. Olive. A
text-to-speech platform for variable length optimal unit searching
using perceptual cost functions. In Proceedings of the ISCA
Research Workshop on Speech Synthesis, August-September 2001.
- 13
- Q. Li and A. Tsai. A matched filter approach to
endpoint detection for robust speaker verification. In
Proceedings of IEEE Workshop on Automatic Identification Advanced
Technologies (AutoID'99), pages 35-38, October 1999.
- 14
- T. Masuko, T. Hitotsumatsu, K. Tokuda and
T. Kobayashi. On the security of HMM-based speaker verification
systems against imposture using synthetic speech. In Proceedings
of the European Conference on Speech Communication and Technology,
Budapest, Hungary, vol.3, pages 1223-1226, September 1999.
- 15
- F. Monrose, M. K. Reiter, and S. Wetzel. Password
hardening based on keystroke dynamics. International Journal of
Information Security 1(2):69-83, February 2002.
- 16
- F. Monrose, M. K. Reiter, Q. Li and
S. Wetzel. Cryptographic key generation from voice (extended
abstract). In Proceeedings of the 2001 IEEE Symposium on
Security and Privacy, May 2001.
- 17
- F. Monrose, M. K. Reiter, Q. Li and S. Wetzel.
Using voice to generate cryptographic keys: A position paper. In
Proceedings of Odyssey 2001, The Speaker Verification Workshop, June
2001.
- 18
- B. L. Pellom and J. H. L. Hansen. An experimental
study of speaker verification sensitivity to computer voice altered
imposters. In Proceedings of the 1999 International Conference
on Acoustics, Speech, and Signal Processing, March 1999.
- 19
- R. Power. 2001 CSI/FBI computer crime and security
survey. Computer Security Issues & Trends VII(1), 2001.
- 20
- L. Rabiner and B.H. Juang. Fundamentals
of Speech Recognition, Prentice Hall, 1993.
- 21
- R. D. Rodman. Computer Speech Technology.
Artech House, Norwood, MA, 1999.
- 22
- A. I. Rudnicky, S. D. Reed, and E. H. Thayer.
SpeechWear: A mobile speech system. In Proceedings of the
International Conference on Spoken Language Processing,
pages 538-541, October 1996.
- 23
- T. Satoh, T. Masuko, T. Kobayashi, and K. Tokuda. A
robust speaker verification system against imposture using an
HMM-based speech synthesis system. In Proceedings of the
European Conference on Speech Communication and Technology, vol.2,
pages 759-762, Aalborg, Denmark, September 2001.
- 24
- G. J. Simmons. An introduction to shared secret
and/or shared control schemes and their application. In
Contemporary Cryptology: The Science of Information Integrity, IEEE
Press, 1992.
- 25
- C. Soutar and G. J. Tomko. Secure private key
generation using a fingerprint. In Cardtech/Securetech
Conference Proceedings, vol. 1, pages 245-252, May 1996.
- 26
- C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and
B.V.K. Vijaya Kumar. Biometric encryption using image
processing. In Optical Security and Counterfeit Deterrence
Techniques II (Proc. SPIE 3314), pages 178-188, 1998.
- 27
- C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and
B.V.K. Vijaya Kumar. Biometric encryption - Enrollment
and verification procedures. In Optical Pattern Recognition IX
(Proc. SPIE 3386), pages 24-35, 1998.
- 28
- R. W. Sproat. Multilingual text-to-speech
synthesis: The Bell Labs approach. Kluwer Academic Pulishers, 1998.
- 29
- J. Tranter. Linux Multimedia Guide. O'Reilly and
Associates, Inc. September, 1996.
- 30
- C. W. Wightman and D. T. Talkin. The aligner:
Text-to-speech alignment usign Markov models. In Progress in
Speech Synthesis, Chapter 25, pages 313-323, Springer-Verlag, 1997.
fabian
2002-08-28