Anti-trojan security module for biometric authentication tasks
暂无分享,去创建一个
[1] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[2] Ana González-Marcos,et al. Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[3] R. Sanchez-Reillo,et al. Access control system with hand geometry verification and smart cards , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[4] Dario Maio,et al. Direct Gray-Scale Minutiae Detection In Fingerprints , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[5] R. Sanchez-Reillo,et al. Securing information and operations in a smart card through biometrics , 2000, Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083).
[6] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[7] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[8] Douglas A. Reynolds,et al. Robust text-independent speaker identification using Gaussian mixture speaker models , 1995, IEEE Trans. Speech Audio Process..
[9] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..