| Time |
Topic |
| 09:30 - 10:00 |
Registration |
| 10:00 - 10:15 |
Welcome and introduction of the TURBINE project
Nicolas Delvaux, MORPHO, FR, TURBINE Project Coordinator |
| |
From Biometrics to Cryptography - moderated by Nicolas Delvaux (MORPHO) |
| 10:15 - 10:50 |
Improve biometrics adaptation for cryptographic techniques,
Anil Jain, Departments of Computer Science & Engineering, and Electrical & Computer Engineering, Michigan University, US |
| 10:50 - 11:10 |
TURBINE innovation to transform features: spectral representation, quantization
Raymond Veldhuis, EEMCS Faculty, Twente University, NL |
| 11:10 - 11:40 |
Coffee Break |
| 11:40 - 12:00 |
Processing for template protection
Patrizio Campisi, Applied Electronics Department, Università degli Studi Roma Tre, IT |
| 12:00 - 12:20 |
Fingerprint feature vector representations
Vincent Despiegel, MORPHO, FR |
| 12:20 - 13:30 |
Lunch |
| |
How to Match with Template Protection - moderated by Hervé Chabanne (MORPHO) |
| 13:30 - 14:05 |
Minutia transformation for template protection
Nalini Ratha, IBM Watson Research Center, US |
| 14:05 - 14:25 |
Aspects & System performance for helper data systems
Emile Kelkboom, Philips Research Europe, NL |
| 14:25 - 14:45 |
Information and coding theory in biometrics
Gérard Cohen, Ecole Nationale Supérieure des Télécommunications, FR |
| |
Architecture & Protocols - moderated by Christoph Busch (Gjøvik University College) |
| 14:45 - 15:20 |
Architecture and template protection
Anoop M. Namboodiri, International Institute of Information Technology Gachibowli Hyderbad, IN |
| 15:20 - 15:40 |
Protocols for biometrics authentication
Stefan Katzenbeisser, Security Engineering Group, Technische Universität Darmstadt, DE |
| 15:40 - 16:00 |
TURBINE architecture and protocols for Trusted ID management
Hervé Chabanne / Julien Bringer, Morpho, FR |
| 16:00 - 16:20 |
Privacy by design: towards a systematic approach.
Daniel Le Métayer, LICIT, INRIA, FR |
| 16:20 - 16:50 |
Coffee Break |
| |
Trust of Crypto-Biometrics - moderated by Emile Kelkboom (Philips Research Europe) |
| 16:50 - 17:15 |
Large - scale Evaluation of Biometrics Algorithms.
Elaine M. Newton, National Institute of Standards and Technology, US |
| 17:15 - 17:40 |
TURBINE: performance evaluation: from benchmarks to airport deployment
Christoph Busch, Norwegian Information Security Laboratory, Gjøvik University College, NO |
| 17:40 - 18:05 |
TURBINE security assessment: How to build trust
Koen Simoens, ESAT-COSIC, Katholieke Universiteit Leuven, BE |
| 18:05 |
Conclusion of the day followed by a cocktail |