Side-Channel Attack on Biometric Cryptosystem Based on Keystroke Dynamics
暂无分享,去创建一个
Zhang Tao | Fan Ming-Yu | Fu Bo | Zhang Tao | Mingquan Fan | Fu Bo
[1] Wei Rao,et al. A new family of combination blind equalization with a new constant modulus algorithm based on variable slope error function , 2006, 2006 8th international Conference on Signal Processing.
[2] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[3] Maria Cristina Felippetto de Castro,et al. Concurrent blind deconvolution for channel equalization , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[4] Philip Schniter,et al. Blind equalization using the constant modulus criterion: a review , 1998, Proc. IEEE.
[5] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[6] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[7] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[8] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[9] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[10] Sun,et al. A Novel Biometric Key Scheme , 2006 .
[11] D. Godard,et al. Self-Recovering Equalization and Carrier Tracking in Two-Dimensional Data Communication Systems , 1980, IEEE Trans. Commun..
[12] Jacques Stern,et al. Efficient Revocation in Group Signatures , 2001, Public Key Cryptography.
[13] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[14] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[15] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[16] Lee Luan Ling,et al. Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.
[17] Dengguo Feng,et al. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..