Empowering the end-user in biometrics
暂无分享,去创建一个
[1] Bettina Berendt,et al. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.
[2] Marek Rejman-Greene,et al. Privacy Issues in the Application of Biometrics: a European Perspective , 2005 .
[3] David Zhang,et al. An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.
[4] Barry W. Boehm,et al. Cost models for future software life cycle processes: COCOMO 2.0 , 1995, Ann. Softw. Eng..
[5] Josef Kittler,et al. On Combination of Face Authentication Experts by a Mixture of Quality Dependent Fusion Classifiers , 2007, MCS.
[6] John D. Woodward,et al. Army Biometric Applications: Identifying and Addressing Sociocultural Concerns , 2001 .
[7] John P. Baker,et al. Fusing multimodal biometrics with quality estimates via a Bayesian belief network , 2008, Pattern Recognit..
[8] Sarah Spiekermann,et al. Perceived Control : Scales for Privacy in Ubiquitous Computing , 2005 .
[9] Hyeonjoon Moon,et al. Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications , 2007, HCI.
[10] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[11] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[12] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[13] Ben A. M. Schouten,et al. BioVision: roadmap for biometrics in Europe to 2010 , 2003 .
[14] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[15] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[16] P.G.S. Rutten,et al. Effective use of smart home technology to increase well-being [ISG08] , 2008 .
[17] Bart Jacobs,et al. Biometrics and their use in e-passports , 2009, Image Vis. Comput..
[18] John P. Baker,et al. Fusion of Biometric Data with Quality Estimates via a Bayesian Belief Network , 2005 .
[19] Josef Kittler,et al. Quality dependent fusion of intramodal and multimodal biometric experts , 2007, SPIE Defense + Commercial Sensing.
[20] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[21] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[22] J. Averill. Personal control over aversive stimuli and its relationship to stress. , 1973 .
[23] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.
[24] Ann Cavoukian,et al. Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy , 2008 .
[25] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.