Secure Operation of Biometric Authentication Based on User’s Viewpoint
暂无分享,去创建一个
[1] Anil K. Jain,et al. An Introduction to Biometric Authentication Systems , 2005 .
[2] Vrushsen P. Pawar,et al. A Study of Different Biometric Authentication Techniques in Cloud Computing , 2017 .
[3] Anil K. Jain,et al. Validating a Biometric Authentication System: Sample Size Requirements , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] Yoichi Seto. Expectations for Products and Research ^|^ Development of Biometric Authentication Technology , 2014 .
[5] Hai Jin,et al. Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing , 2012, 2012 Second International Conference on Cloud and Green Computing.
[6] Raymond N. J. Veldhuis,et al. Biometric Authentication System on Mobile Personal Devices , 2010, IEEE Transactions on Instrumentation and Measurement.
[7] Peter W. McOwan,et al. Java-Based Internet Biometric Authentication System , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Himabindu Vallabhu,et al. Biometric Authentication as a Service on Cloud: Novel Solution , 2012 .
[9] Anil K. Jain,et al. Biometric Authentication: System Security and User Privacy , 2012, Computer.