Multimodal biometric authentication for mobile edge computing
暂无分享,去创建一个
[1] Qing Yang,et al. Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones , 2016, IEEE Transactions on Information Forensics and Security.
[2] Julian Fiérrez,et al. Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..
[3] Philip Ogunbona,et al. Private Fingerprint Matching , 2012, ACISP.
[4] Wendi B. Heinzelman,et al. Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).
[5] Katherine Guo,et al. Cachier: Edge-Caching for Recognition Applications , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[6] Jason P. Jue,et al. All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .
[7] Benny Pinkas,et al. Efficient Set Intersection with Simulation-Based Security , 2014, Journal of Cryptology.
[8] David Pointcheval,et al. Functional Encryption with Oblivious Helper , 2017, AsiaCCS.
[9] Neyire Deniz Sarier. Privacy Preserving Multimodal Biometric Authentication in the Cloud , 2017, GPC.
[10] Angelo De Caro,et al. Simple Functional Encryption Schemes for Inner Products , 2015, IACR Cryptol. ePrint Arch..
[11] Keke Gai,et al. An Energy-Aware High Performance Task Allocation Strategy in Heterogeneous Fog Computing Environments , 2021, IEEE Transactions on Computers.
[12] Hai Jin,et al. Computation Offloading Toward Edge Computing , 2019, Proceedings of the IEEE.
[13] M. Shamim Hossain,et al. Edge-centric multimodal authentication system using encrypted biometric templates , 2018, Future Gener. Comput. Syst..
[14] Julien Bringer,et al. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.
[15] Xiaomin Liu,et al. Fast Secure Computation of Set Intersection , 2010, SCN.
[16] Neyire Deniz Sarier. Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management , 2021, Comput. Secur..
[17] Keke Gai,et al. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..
[18] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[19] Tie Qiu,et al. Fog Computing Based Face Identification and Resolution Scheme in Internet of Things , 2017, IEEE Transactions on Industrial Informatics.
[20] Neyire Deniz Sarier. Private Minutia-Based Fingerprint Matching , 2015, WISTP.
[21] Yong Meng Teo,et al. Towards Analyzing the Performance of Hybrid Edge-Cloud Processing , 2019, 2019 IEEE International Conference on Edge Computing (EDGE).
[22] WADOOD ABDUL,et al. Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.
[23] Qian Wang,et al. Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.
[24] Sébastien Marcel,et al. The 2013 speaker recognition evaluation in mobile environment , 2013, 2013 International Conference on Biometrics (ICB).
[25] Feng Li,et al. Outsourceable two-party privacy-preserving biometric authentication , 2014, AsiaCCS.
[26] Keke Gai,et al. Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing , 2018, J. Parallel Distributed Comput..
[27] Neyire Deniz Sarier. Efficient biometric-based identity management on the Blockchain for smart industrial applications , 2021, Pervasive Mob. Comput..
[28] Zhihui Lu,et al. Fusion of Cognitive Wireless Networks and Edge Computing , 2019, IEEE Wireless Communications.
[29] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[30] Adlen Ksentini,et al. On Using Edge Computing for Computation Offloading in Mobile Network , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[31] Satoshi Obana,et al. Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks , 2015, SAC.
[32] Patrizio Campisi,et al. Hill-Climbing Attacks on Multibiometrics Recognition Systems , 2015, IEEE Transactions on Information Forensics and Security.