Enhancing Security and Privacy in Enterprises Network by Using Biometrics Technologies
暂无分享,去创建一个
Abdallah Meraoumia | Hakim Bendjenna | Mohamed Amroune | Yahia Dris | A. Meraoumia | H. Bendjenna | M. Amroune | Yahia Dris
[1] Eul Gyu Im,et al. Malware analysis using visualized images and entropy graphs , 2014, International Journal of Information Security.
[2] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[3] Pierre-Jean Charrel,et al. AspeCis: An Aspect-Oriented Approach to Develop a Cooperative Information System , 2011, MEDI.
[4] Li Lei,et al. Palmprint verification based on 2D - Gabor wavelet and pulse-coupled neural network , 2012, Knowl. Based Syst..
[5] Sheng-Wen Shih,et al. Biometric recognition by fusing palmprint and hand-geometry based on morphology , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[6] Rik Eshuis,et al. Dynamic business network process management in instant virtual enterprises , 2009, Comput. Ind..
[7] Mauro Barni,et al. eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.
[8] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[9] Hye Kyung Park,et al. Virtual enterprise — Information system and networking solution , 1999 .
[10] Adel M. Alimi,et al. Personal recognition system using hand modality based on local features , 2015, 2015 11th International Conference on Information Assurance and Security (IAS).
[11] Ahmed Bouridane,et al. An Automated Finger-Knuckle-Print Identification System Using Jointly RBF & RFT Classifiers , 2016, 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace and Security (IUCC-CSS).
[12] Michal Choras,et al. Image Feature Extraction Methods for Ear Biometrics--A Survey , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).
[13] Helen C. Shen,et al. Personal Verification Using Palmprint and Hand Geometry Biometric , 2003, AVBPA.
[14] Thuc Dinh Nguyen,et al. Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.
[15] C. C. van Waveren,et al. Project Portfolio Management and Enterprise Resource Management: Merging Technologies? , 2012, 2012 Proceedings of PICMET '12: Technology Management for Emerging Technologies.
[16] Pierre-Jean Charrel,et al. Eliciting requirements for an inter-company cooperative information system , 2010, J. Syst. Inf. Technol..
[17] Christophe Rosenberger,et al. Palm Vein Verification System Based on SIFT Matching , 2009, ICB.
[18] Masaya Yasuda,et al. Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption , 2017, Inf. Secur. J. A Glob. Perspect..
[19] K. Artto,et al. New value creation in business networks: The role of collective action in constructing system-level goals , 2017 .
[20] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[21] D. Ford,et al. The theory and practice of business networking , 2013 .
[22] Miguel Angel Ferrer-Ballester,et al. Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach , 2007, Neural Processing Letters.
[23] Paul W. P. J. Grefen,et al. An analysis of web services support for dynamic business process outsourcing , 2006, Inf. Softw. Technol..
[24] Lei Tian,et al. Chaotic secure content-based hidden transmission of biometric templates , 2007 .
[25] Sudeep D. Thepade,et al. Bimodal biometric identification with Palmprint and Iris traits using fractional coefficients of Walsh, Haar and Kekre transforms , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).
[26] Laurel R Jackson,et al. When business networks "kill" social networks : a case study in Bangladesh , 2016 .
[27] J. Forrester. Industrial Dynamics: A Major Breakthrough for Decision Makers , 2012 .
[28] Christopher J. Medlin,et al. Dimensions of space in business network research , 2017 .