A biometric-based scheme for enhancing security of cryptographic keys
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[3] Alexander Kadyrov,et al. The Trace Transform and Its Applications , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1998, CCS '98.
[5] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[7] Ville Taponen. Tamper-resistant Smart Cards – Too Much To Ask For ? , 2000 .
[8] Randall K. Nichols. ICSA guide to cryptography , 1998 .
[9] A. R. Rao,et al. A Taxonomy for Texture Description and Identification , 1990, Springer Series in Perception Engineering.