Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Next Generation Secure Computing: Biometric in Secure E-transaction
暂无分享,去创建一个
[1] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[2] W. Marsden. I and J , 2012 .
[3] Dexin Zhang,et al. Personal Identification Based on Iris Texture Analysis , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[5] V. S. Nalwa. Automatic on-line signature verification , 1997 .
[6] Ana González-Marcos,et al. Biometric Identification through Hand Geometry Measurements , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[7] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[8] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[9] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[10] Ashok A. Ghatol,et al. Iris recognition: an emerging biometric technology , 2007 .
[11] Arun Sundararajan,et al. Are Digital Rights Valuable? Theory and Evidence from the eBook Industry , 2004, ICIS.
[12] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[13] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.