暂无分享,去创建一个
[1] Jonathan Oliver,et al. TLSH -- A Locality Sensitive Hash , 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop.
[2] Hitesh Tewari. Blockchain Research Beyond Cryptocurrencies , 2019, IEEE Communications Standards Magazine.
[3] Peter K. Pearson,et al. Fast hashing of variable-length text strings , 1990, CACM.
[4] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[5] Libor Masek,et al. Recognition of Human Iris Patterns for Biometric Identification , 2003 .
[6] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[7] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[8] Deokjai Choi,et al. FEHash: Full Entropy Hash for Face Template Protection , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[9] John Daugman,et al. Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns , 2001, International Journal of Computer Vision.
[10] Hitesh Tewari,et al. Managing Lifetime Healthcare Data on the Blockchain , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[11] A. Phelan,et al. COVID-19 immunity passports and vaccination certificates: scientific, equitable, and legal challenges , 2020, The Lancet.
[12] Ranju Grover. RECOGNITION OF HUMAN IRIS PATTERNS FOR BIOMETRIC IDENTIFICATION , 2014 .