default search action
Tom A. M. Kevenaar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j12]Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter:
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries. IEEE Trans. Inf. Forensics Secur. 16: 5045-5060 (2021) - [i3]Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter:
Biometric Verification Secure Against Malicious Adversaries. CoRR abs/2101.10631 (2021)
2010 – 2019
- 2013
- [j11]Bernhard Deufel, Carsten Mueller, Gavan Duffy, Tom Kevenaar:
BioPACE. Datenschutz und Datensicherheit 37(6): 363-366 (2013) - 2012
- [c16]Johannes Merkle, Tom A. M. Kevenaar, Ulrike Korte:
Multi-modal and multi-instance fusion for biometric cryptosystems. BIOSIG 2012: 1-6 - 2011
- [j10]Emile J. C. Kelkboom, Jeroen Breebaart, Tom A. M. Kevenaar, Ileana Buhan, Raymond N. J. Veldhuis:
Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme. IEEE Trans. Inf. Forensics Secur. 6(1): 107-121 (2011) - 2010
- [j9]Emile J. C. Kelkboom, Gary Garcia Molina, Jeroen Breebaart, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, Willem Jonker:
Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption. IEEE Trans. Syst. Man Cybern. Part A 40(3): 555-571 (2010) - [c15]Tom A. M. Kevenaar, Ulrike Korte, Johannes Merkle, Matthias Niesing, Heinrich Ihmor, Christoph Busch, Xuebing Zhou:
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems. BIOSIG 2010: 45-56
2000 – 2009
- 2009
- [j8]Chun Chen, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, Anton H. M. Akkermans:
Biometric Quantization through Detection Rate Optimized Bit Allocation. EURASIP J. Adv. Signal Process. 2009 (2009) - [j7]Haiyun Xu, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, Anton H. M. Akkermans:
A Fast Minutiae-Based Fingerprint Recognition System. IEEE Syst. J. 3(4): 418-427 (2009) - [j6]Haiyun Xu, Raymond N. J. Veldhuis, Asker M. Bazen, Tom A. M. Kevenaar, Anton H. M. Akkermans, Berk Gökberk:
Fingerprint verification using spectral minutiae representations. IEEE Trans. Inf. Forensics Secur. 4(3): 397-409 (2009) - [c14]Julien Bringer, Hervé Chabanne, Tom A. M. Kevenaar, Bruno Kindarji:
Extending Match-On-Card to Local Biometric Identification. COST 2101/2102 Conference 2009: 178-186 - 2008
- [j5]Tom A. M. Kevenaar, Michiel van der Veen, Xuebing Zhou, Christoph Busch:
Privacy for biometric identification information. Datenschutz und Datensicherheit 32(6): 393-395 (2008) - [c13]Chun Chen, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, Anton H. M. Akkermans:
Biometric binary string generation with detection rate optimized bit allocation. CVPR Workshops 2008: 1-7 - [c12]Haiyun Xu, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, Anton H. M. Akkermans, Asker M. Bazen:
Spectral minutiae: A fixed-length representation of a minutiae set. CVPR Workshops 2008: 1-6 - 2007
- [c11]Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, Christoph Busch, Michiel van der Veen, Alexander Nouak:
Privacy enhancing technology for a 3D-face recognition system. BIOSIG 2007: 3-14 - [c10]Emile J. C. Kelkboom, Berk Gökberk, Tom A. M. Kevenaar, Anton H. M. Akkermans, Michiel van der Veen:
"3D Face": Biometric Template Protection for 3D Face Recognition. ICB 2007: 566-573 - [p1]Pim Tuyls, Tom A. M. Kevenaar:
Private Person Authentication in an Ambient World. Security, Privacy, and Trust in Modern Data Management 2007: 417-431 - 2006
- [j4]Marten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls:
Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. Inf. Process. Lett. 99(4): 154-157 (2006) - [c9]Anton H. M. Akkermans, Tom A. M. Kevenaar, Daniel W. E. Schobben:
Acoustic Ear Recognition. ICB 2006: 697-705 - [c8]Tom A. M. Kevenaar, Geert Jan Schrijen, Anton H. M. Akkermans, Marijn Damstra, Pim Tuyls, Michiel van der Veen:
Robust and Secure Biometrics: Some Application Examples. ISSE 2006: 196-203 - [c7]Michiel van der Veen, Tom A. M. Kevenaar, Geert Jan Schrijen, Ton H. Akkermans, Fei Zuo:
Face biometrics with renewable templates. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720J - [i2]Boris Skoric, Stefan Maubach, Tom A. M. Kevenaar, Pim Tuyls:
Information-theoretic analysis of coating PUFs. IACR Cryptol. ePrint Arch. 2006: 101 (2006) - 2005
- [c6]Tom A. M. Kevenaar, Geert Jan Schrijen, Michiel van der Veen, Anton H. M. Akkermans, Fei Zuo:
Face Recognition with Renewable and Privacy Preserving Binary Templates. AutoID 2005: 21-26 - [c5]Anton H. M. Akkermans, Tom A. M. Kevenaar, Daniel W. E. Schobben:
Acoustic Ear Recognition for Person Identification. AutoID 2005: 219-223 - [c4]Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, Raymond N. J. Veldhuis:
Practical Biometric Authentication with Template Protection. AVBPA 2005: 436-446 - 2003
- [c3]Thomas S. Messerges, Johnas Cukier, Tom A. M. Kevenaar, Larry Puhl, René Struik, Ed Callaway:
A security design for a general purpose, self-organizing, multihop ad hoc wireless network. SASN 2003: 1-11 - [c2]Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications. SPC 2003: 271-284 - [i1]Pim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk:
Visual Crypto Displays Enabling Secure Communications. IACR Cryptol. ePrint Arch. 2003: 118 (2003)
1990 – 1999
- 1996
- [j3]J. van Spaandonk, Tom A. M. Kevenaar:
Selecting measurements to test the functional behavior of analog circuits. J. Electron. Test. 9(1-2): 9-18 (1996) - [c1]J. van Spaandonk, Tom A. M. Kevenaar:
Iterative test-point selection for analog circuits. VTS 1996: 66-73 - 1994
- [j2]Tom A. M. Kevenaar:
Periodic steady state analysis using shooting and wave-form-newton. Int. J. Circuit Theory Appl. 22(1): 51-60 (1994) - 1991
- [j1]Tom A. M. Kevenaar, Domine M. W. Leenaerts:
A flexible hierarchical piecewise linear simulator. Integr. 12(2): 211-235 (1991)
Coauthor Index
aka: Ton H. Akkermans
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint