Cloud Security Using Ear Biometrics
暂无分享,去创建一个
[1] Marios D. Dikaiakos,et al. Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.
[2] Yoshiaki Katayama,et al. Cloud Cognitive Authenticator (CCA): A public cloud computing authentication mechanism , 2013, 2013 International Conference on Informatics, Electronics and Vision (ICIEV).
[3] Arun Ross,et al. A survey on ear biometrics , 2013, CSUR.
[4] Alex Pentland,et al. View-based and modular eigenspaces for face recognition , 1994, 1994 Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
[5] Khalid T. Al-Sarayreh,et al. A Novel Approach to Build a Generic Model of Photovoltaic Solar System Using Sound Biometric Techniques , 2014, Int. J. Inf. Technol. Web Eng..
[6] V. K. Agrawal,et al. Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.
[7] Shin-Jer Yang,et al. Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[8] R. Jantz,et al. Anthropological Dermatoglyphic Research , 1987 .
[9] Zhuang Jin-lia. Research on Cloud Computing Security , 2014 .
[10] James L. Wayman,et al. Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..
[11] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[12] Yongzhao Zhan,et al. Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.
[13] Markus Jakobsson,et al. Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.
[14] Craig Standing. The Requirements of Methodologies for Developing Web Applications , 2001, ECIS.
[15] Dengguo Feng,et al. Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .
[16] Anil K. Jain,et al. An Introduction to Biometric Authentication Systems , 2005 .
[17] Cyril Onwubiko,et al. Security Issues to Cloud Computing , 2010, Cloud Computing.
[18] R. Jantz,et al. Variation among European populations in summary finger ridge-count variables. , 1997, Annals of human biology.
[19] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[20] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[21] Arun Ross,et al. Handbook of Biometrics , 2007 .
[22] Y. S. Moon,et al. Recent advances in ear biometrics , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..
[23] Xiaoping Wu,et al. Cloud Computing System Based on Trusted Computing Platform , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.
[24] Ghassan Issa,et al. Demand-Driven Algorithm for Sharing and Distribution of Photovoltaic Power in a Small Local Area Grid , 2014, Int. J. Inf. Technol. Web Eng..
[25] Thomas Sandholm,et al. What's inside the Cloud? An architectural map of the Cloud landscape , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[26] Shucheng Yu,et al. Efficient privacy-preserving biometric identification in cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.
[27] Dimitrios Katsaros,et al. Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.
[28] Siani Pearson,et al. Privacy and Security for Cloud Computing , 2012, Computer Communications and Networks.
[29] Chandrakant D. Patel,et al. Everything as a Service: Powering the New Information Economy , 2011, Computer.
[30] Guy Gouardères,et al. E-Portfolio to Promote the Virtual Learning Group Communities on the Grid , 2006, Int. J. Inf. Technol. Web Eng..
[31] Bhavani M. Thuraisingham,et al. Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..
[32] Schahram Dustdar,et al. DEMODS: A Description Model for Data-as-a-Service , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[33] Weimin Wei,et al. A Deep Understanding of Cloud Computing Security , 2012 .
[34] Holger Regenbrecht,et al. Increased Popularity Through Compliance with Usability Guidelines in E-Learning Web Sites , 2009, Int. J. Inf. Technol. Web Eng..
[35] Hai Jin,et al. Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing , 2012, 2012 Second International Conference on Cloud and Green Computing.
[36] Chunming Rong,et al. A Secure Data Access Mechanism for Cloud Tenants , 2012, CLOUD 2012.
[37] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, ICPR 2004.
[38] Ping Wang,et al. A New Fingerprint Authentication Scheme based on Secret-splitting for Cloud Computing Security , 2011 .
[39] Takaya Yuizono,et al. Study on individual recognition for ear images by using genetic local search , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).