Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Toward Speech-Generated Cryptographic Keys Previous: Acknowledgements

Bibliography

1
D. Bleichenbacher. Encoding schemes for generating keys from a low-entropy noisy source, 2002.

2
D. Bleichenbacher and P. Nguyen. Noisy polynomial interpolation and noisy Chinese remaindering. In Advances in Cryptology - Proceedings of EUROCRYPT '2000 (LNCS 1807), Springer-Verlag, pages 53-69, 2000.

3
P. Bohannon, M. Jakobsson, and S. Srikwan. Cryptographic approaches to privacy in DNA databases. In Proceedings of the 2000 International Workshop on Practice and Theory in Public Key Cryptography, January 2000.

4
G. I. Davida, Y. Frankel, and B. J. Matt. On enabling secure applications through off-line biometric identification. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 148-157, May 1998.

5
R. B. Davies. A matrix library in C++. September 1997. https://www.webnx.com/robert.

6
G. R. Doddington, W. Liggett, A. F. Martin, M. Przybocki, and D. A. Reynolds. Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. In Proceedings of the $5^{\rm th}$ International Conference on Spoken Language Processing, November 1998.

7
C. Ellison, C. Hall, R. Milbert, and B. Schneier. Protecting secret keys with personal entropy. Future Generation Computer Systems 16:311-318, 2000.

8
D. Genoud and G. Chollet. Speech pre-processing against intentional imposture in speaker recognition. In Proceedings of the 1998 International Conference on Spoken Language Processing, pages 105-108, December 1998.

9
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proceedings of the $6^{\rm th}$ ACM Conference on Computer and Communication Security, pages 28-36, November 1999.

10
Frederick Jelinek. Statistical Methods for Speech Recognition. MIT Press, 1997.

11
J. B. Lacy, D. P. Mitchell, and W. M. Schell. CryptoLib: cryptography in software. In Proceedings of the $4^{\rm th}$ UNIX Security Symposium, Oct. 1993.

12
M. Lee, D. P. Lopresti and J. P. Olive. A text-to-speech platform for variable length optimal unit searching using perceptual cost functions. In Proceedings of the $4^{\rm th}$ ISCA Research Workshop on Speech Synthesis, August-September 2001.

13
Q. Li and A. Tsai. A matched filter approach to endpoint detection for robust speaker verification. In Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'99), pages 35-38, October 1999.

14
T. Masuko, T. Hitotsumatsu, K. Tokuda and T. Kobayashi. On the security of HMM-based speaker verification systems against imposture using synthetic speech. In Proceedings of the European Conference on Speech Communication and Technology, Budapest, Hungary, vol.3, pages 1223-1226, September 1999.

15
F. Monrose, M. K. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. International Journal of Information Security 1(2):69-83, February 2002.

16
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel. Cryptographic key generation from voice (extended abstract). In Proceeedings of the 2001 IEEE Symposium on Security and Privacy, May 2001.

17
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel. Using voice to generate cryptographic keys: A position paper. In Proceedings of Odyssey 2001, The Speaker Verification Workshop, June 2001.

18
B. L. Pellom and J. H. L. Hansen. An experimental study of speaker verification sensitivity to computer voice altered imposters. In Proceedings of the 1999 International Conference on Acoustics, Speech, and Signal Processing, March 1999.

19
R. Power. 2001 CSI/FBI computer crime and security survey. Computer Security Issues & Trends VII(1), 2001.

20
L. Rabiner and B.H. Juang. Fundamentals of Speech Recognition, Prentice Hall, 1993.

21
R. D. Rodman. Computer Speech Technology. Artech House, Norwood, MA, 1999.

22
A. I. Rudnicky, S. D. Reed, and E. H. Thayer. SpeechWear: A mobile speech system. In Proceedings of the $4^{\rm th}$ International Conference on Spoken Language Processing, pages 538-541, October 1996.

23
T. Satoh, T. Masuko, T. Kobayashi, and K. Tokuda. A robust speaker verification system against imposture using an HMM-based speech synthesis system. In Proceedings of the European Conference on Speech Communication and Technology, vol.2, pages 759-762, Aalborg, Denmark, September 2001.

24
G. J. Simmons. An introduction to shared secret and/or shared control schemes and their application. In Contemporary Cryptology: The Science of Information Integrity, IEEE Press, 1992.

25
C. Soutar and G. J. Tomko. Secure private key generation using a fingerprint. In Cardtech/Securetech Conference Proceedings, vol. 1, pages 245-252, May 1996.

26
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B.V.K. Vijaya Kumar. Biometric encryption$^{\rm TM}$ using image processing. In Optical Security and Counterfeit Deterrence Techniques II (Proc. SPIE 3314), pages 178-188, 1998.

27
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B.V.K. Vijaya Kumar. Biometric encryption$^{\rm TM}$ - Enrollment and verification procedures. In Optical Pattern Recognition IX (Proc. SPIE 3386), pages 24-35, 1998.

28
R. W. Sproat. Multilingual text-to-speech synthesis: The Bell Labs approach. Kluwer Academic Pulishers, 1998.

29
J. Tranter. Linux Multimedia Guide. O'Reilly and Associates, Inc. September, 1996.

30
C. W. Wightman and D. T. Talkin. The aligner: Text-to-speech alignment usign Markov models. In Progress in Speech Synthesis, Chapter 25, pages 313-323, Springer-Verlag, 1997.


fabian 2002-08-28