Contemporary IT Security for Military Online Collaboration Platforms
暂无分享,去创建一个
[1] B. Gladman,et al. Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction , 2022 .
[2] Douglas Stebila,et al. Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer , 2009, RFC.
[3] H V PIPBERGER,et al. Automatic Recognition of Electrocardiographic Waves by Digital Computer , 1961, Circulation research.
[4] Ana L. N. Fred,et al. Unveiling the Biometric Potential of Finger-Based ECG Signals , 2011, Comput. Intell. Neurosci..
[5] L. Biel,et al. ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).
[6] Mohammad Derawi,et al. Fusion of gait and ECG for biometric user authentication , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[7] Paul Lukowicz,et al. AMON: a wearable multiparameter medical monitoring and alert system , 2004, IEEE Transactions on Information Technology in Biomedicine.
[8] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[9] Paul Lukowicz,et al. AMON: a wearable medical computer for high risk patients , 2002, Proceedings. Sixth International Symposium on Wearable Computers,.
[10] Willis J. Tompkins,et al. Implementation of a one-lead ECG human identification system on a normal population , 2010 .
[11] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[12] Fethi Bereksi-Reguig,et al. A novel biometric authentication approach using ECG and EMG signals , 2015, Journal of medical engineering & technology.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[14] Ana L. N. Fred,et al. ECG-based Continuous Authentication System using Adaptive String Matching , 2011, BIOSIGNALS.
[15] Guido Bertoni,et al. The Making of KECCAK , 2014, Cryptologia.
[16] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[17] Eric Rescorla,et al. Diffie-Hellman Key Agreement Method , 1999, RFC.
[18] Jiankun Hu,et al. ECG-Based Authentication , 2010, Handbook of Information and Communication Security.
[19] Ana L. N. Fred,et al. Finger ECG signal for user authentication: Usability and performance , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[20] Dimitrios Hatzinakos,et al. Analysis of Human Electrocardiogram for Biometric Recognition , 2008, EURASIP J. Adv. Signal Process..
[21] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[22] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[23] Friedrich L. Bauer,et al. Decrypted secrets - methods and maxims of cryptology , 1997 .
[24] D. Hatzinakos,et al. ECG Biometric Recognition Without Fiducial Detection , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[25] Karim Faez,et al. Human Identification Based on Electrocardiogram and Palmprint , 2012 .
[26] Joseph A. O'Sullivan,et al. ECG Biometric Recognition: A Comparative Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[27] Ola Pettersson,et al. ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..
[28] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[29] Yu Hen Hu,et al. One-lead ECG for identity verification , 2002, Proceedings of the Second Joint 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society] [Engineering in Medicine and Biology.
[30] Tanzeem Choudhury,et al. Activity-aware ECG-based patient authentication for remote health monitoring , 2009, ICMI-MLMI '09.
[31] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[32] Mohammed Abo-Zahhad,et al. Biometric authentication based on PCG and ECG signals: present status and future directions , 2013, Signal, Image and Video Processing.
[33] John J Soraghan,et al. Pulse Active Bit (PAB) feature extractor for ECG biometric authentication , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[34] Michiel van der Veen,et al. Morphological synthesis of ECG signals for person authentication , 2007, 2007 15th European Signal Processing Conference.
[35] Hugo Silva,et al. Study and evaluation of a single differential sensor design based on electro-textile electrodes for ECG biometrics applications , 2011, 2011 IEEE SENSORS Proceedings.
[36] John J. Soraghan,et al. Pulse Active Ratio (PAR): A new feature extraction technique for ECG biometric authentication , 2011, 2011 IEEE International Conference on Signal and Image Processing Applications (ICSIPA).
[37] Adrian D. C. Chan,et al. Wavelet Distance Measure for Person Identification Using Electrocardiograms , 2008, IEEE Transactions on Instrumentation and Measurement.
[38] Ana L. N. Fred,et al. Towards a Finger based ECG Biometric System , 2011, BIOSIGNALS.
[39] A. N. Zincir-Heywood,et al. Intrusion Detection Systems , 2008 .
[40] Steve Mansfield-Devine. Biometrics at war: the US military's need for identification and authentication , 2012 .
[41] Brenda K. Wiederhold,et al. ECG to identify individuals , 2005, Pattern Recognit..
[42] Roberto Sassi,et al. ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authentication , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[43] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[44] Lalit M. Patnaik,et al. Multimodal Biometric Authentication using ECG and Fingerprint , 2015 .