default search action
Tanya Ignatenko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Xianbo Xu, Bart van Erp, Tanya Ignatenko:
Context-Aware Preference Learning System Based on Dirichlet Process Gaussian Mixture Model. ICASSP 2024: 6805-6809 - 2021
- [i3]Tanya Ignatenko, Kirill Kondrashov, Marco Cox, Bert de Vries:
On Sequential Bayesian Optimization with Pairwise Comparison. CoRR abs/2103.13192 (2021)
2010 – 2019
- 2018
- [j5]Massimo Mischi, Chuan Chen, Tanya Ignatenko, Hinke de Lau, Beijing Ding, S. Guid Oei, Chiara Rabotti:
Dedicated Entropy Measures for Early Assessment of Pregnancy Progression From Single-Channel Electrohysterography. IEEE Trans. Biomed. Eng. 65(4): 875-884 (2018) - 2017
- [c18]Hongxu Yang, Vojkan Mihajlovic, Tanya Ignatenko:
Private authentication keys based on wearable device EEG recordings. EUSIPCO 2017: 956-960 - [c17]Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes. GLOBECOM 2017: 1-6 - [c16]Lieneke Kusters, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios. ISIT 2017: 1803-1807 - [i2]Bin Chen, Tanya Ignatenko, Frans M. J. Willems, Roel Maes, Erik van der Sluis, Georgios N. Selimis:
High-Rate Error Correction Schemes for SRAM-PUFs based on Polar Codes. CoRR abs/1701.07320 (2017) - 2016
- [e1]Fernando Pérez-González, Patrick Bas, Tanya Ignatenko, François Cayre:
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016. ACM 2016, ISBN 978-1-4503-4290-2 [contents] - 2015
- [j4]Tanya Ignatenko, Frans M. J. Willems:
Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication. IEEE Trans. Inf. Theory 61(10): 5583-5594 (2015) - [c15]Tanya Ignatenko:
Biometrics in claim-based authentication framework. SPAWC 2015: 385-389 - 2014
- [c14]Tanya Ignatenko, Frans M. J. Willems:
Privacy-leakage codes for biometric authentication systems. ICASSP 2014: 1601-1605 - [c13]Tanya Ignatenko, Milan Petkovic:
AU2EU: Privacy-Preserving Matching of DNA Sequences. WISTP 2014: 180-189 - 2013
- [p1]Tanya Ignatenko, Frans M. J. Willems:
Privacy Leakage in Binary Biometric Systems: From Gaussian to Binary Data. Security and Privacy in Biometrics 2013: 105-122 - 2012
- [j3]Tanya Ignatenko, Frans M. J. Willems:
Biometric Security from an Information-Theoretical Perspective. Found. Trends Commun. Inf. Theory 7(2-3): 135-316 (2012) - [c12]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. ARES 2012: 212-217 - [c11]Frans M. J. Willems, Tanya Ignatenko:
Authentication based on secret-key generation. ISIT 2012: 1792-1796 - [i1]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. CoRR abs/1205.5757 (2012) - 2010
- [j2]Tanya Ignatenko, Frans M. J. Willems:
Information leakage in fuzzy commitment schemes. IEEE Trans. Inf. Forensics Secur. 5(2): 337-348 (2010) - [c10]Tanya Ignatenko, Frans M. J. Willems:
Fundamental limits for biometric identification with a database containing protected templates. ISITA 2010: 54-59 - [c9]Tanya Ignatenko, Frans M. J. Willems:
On information leakage in fuzzy commitment. Media Forensics and Security 2010: 75410P - [c8]Frans M. J. Willems, Tanya Ignatenko:
Identification and secret-key generation in biometric systems with protected templates. MM&Sec 2010: 63-66 - [c7]Frans M. J. Willems, Tanya Ignatenko:
Identification and secret-key binding in binary-symmetric template-protected biometric systems. WIFS 2010: 1-5
2000 – 2009
- 2009
- [j1]Tanya Ignatenko, Frans M. J. Willems:
Biometric systems: privacy and secrecy aspects. IEEE Trans. Inf. Forensics Secur. 4(4): 956-973 (2009) - [c6]Tanya Ignatenko, Frans M. J. Willems:
Achieving Secure Fuzzy Commitment Scheme for Optical PUFs. IIH-MSP 2009: 1185-1188 - [c5]Tanya Ignatenko, Frans M. J. Willems:
Secret rate - Privacy leakage in biometric systems. ISIT 2009: 2251-2255 - 2008
- [c4]Tanya Ignatenko, Frans M. J. Willems:
Privacy leakage in biometric secrecy systems. Allerton 2008: 850-857 - 2007
- [c3]Tanya Ignatenko, Frans M. J. Willems:
On Privacy in Secure Biometric Authentication Systems. ICASSP (2) 2007: 121-124 - 2006
- [c2]Tanya Ignatenko, Geert Jan Schrijen, Boris Skoric, Pim Tuyls, Frans M. J. Willems:
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. ISIT 2006: 499-503 - [c1]Tanya Ignatenko, Ton Kalker, Michiel van der Veen, Asker M. Bazen:
Reference point detection for improved fingerprint matching. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720G
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint