Biometric Digital Key Mechanisms for Telebiometric Authentication Based on Biometric Certificate
暂无分享,去创建一个
[1] Anil K. Jain,et al. Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Mohammed Yakoob Siyal,et al. Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..
[3] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Alfred C. Weaver,et al. Biometric authentication , 2006, Computer.
[6] Václav Matyás,et al. Biometric authentication - security and usability , 2002, Communications and Multimedia Security.
[7] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[8] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometrics , 2005 .
[9] Taekyoung Kwon,et al. Practical Digital Signature Generation Using Biometrics , 2004, ICCSA.
[10] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[11] Shuchi Nagpal,et al. Biometric based Digital Signature scheme , 2002 .
[12] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[13] Antonio Laganà,et al. Computational Science and Its Applications – ICCSA 2004 , 2004, Lecture Notes in Computer Science.
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[15] J. G. Daugman. High confidence personal identification by rapid video analysis of iris texture , 1992, Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures.
[16] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[17] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[18] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[19] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.