Effects of Feature Trimming on Encryption Key Stability for an ICmetric System
暂无分享,去创建一个
[1] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[2] W. Gareth J. Howells,et al. Novel Techniques for Ensuring Secure Communications for Distributed Low Power Devices , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).
[3] W. Gareth J. Howells,et al. Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).
[4] Peter M. Fenwick. Variable-length integer codes based on the Goldbach conjecture, and other additive codes , 2002, IEEE Trans. Inf. Theory.
[5] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[6] Keinosuke Fukunaga,et al. Introduction to Statistical Pattern Recognition , 1972 .
[7] Kohji Fukunaga,et al. Introduction to Statistical Pattern Recognition-Second Edition , 1990 .
[8] Yoshua Bengio,et al. Pattern Recognition and Neural Networks , 1995 .
[9] Tsuhan Chen,et al. Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[10] W. Gareth J. Howells,et al. Integrating Multi-Modal Circuit Features within an Efficient Encryption System , 2007, Third International Symposium on Information Assurance and Security.
[11] David Wheeler. Protocols Using Keys from Faulty Data , 2001, Security Protocols Workshop.