Biometric Security and Internet of Things (IoT)
暂无分享,去创建一个
Mohammad S. Obaidat | Tanmoy Maitra | Debasis Giri | Subrata Dutta | Soumya Prakash Rana | M. Obaidat | Debasis Giri | Tanmoy Maitra | S. Dutta | S. P. Rana
[1] Michele Zorzi,et al. Health care applications: a solution based on the internet of things , 2011, ISABEL '11.
[2] Marcos Faúndez-Zanuy,et al. Biometric security technology , 2006, IEEE Aerospace and Electronic Systems Magazine.
[3] Mohammad S. Obaidat,et al. Security of e-Systems and Computer Networks , 2007 .
[4] Yu Feng,et al. The study and application of the IOT technology in agriculture , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[5] Wei Wang,et al. Recognizing Keystrokes Using WiFi Devices , 2017, IEEE Journal on Selected Areas in Communications.
[6] Eric C. Larson,et al. SpiroSmart: using a microphone to measure lung function on a mobile phone , 2012, UbiComp.
[7] Zeng Lingkang. Internet of things and smart grid , 2012 .
[8] Michele Ruta,et al. CoAP-based healthcare sensor networks: A survey , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.
[9] Carsten Gottschlich. Curved Gabor Filters for Fingerprint Image Enhancement , 2011, ArXiv.
[10] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[11] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[12] Theresa A. Pardo,et al. Conceptualizing smart city with dimensions of technology, people, and institutions , 2011, dg.o '11.
[13] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[14] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[15] von F. Zernike. Beugungstheorie des schneidenver-fahrens und seiner verbesserten form, der phasenkontrastmethode , 1934 .
[16] Dario Bonino,et al. ALMANAC: Internet of Things for Smart Cities , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.
[17] Dong-Chen He,et al. Texture Unit, Texture Spectrum, And Texture Analysis , 1990 .
[18] Carsten Gottschlich,et al. Curved-Region-Based Ridge Frequency Estimation and Curved Gabor Filters for Fingerprint Image Enhancement , 2011, IEEE Transactions on Image Processing.
[19] Mohammad S. Obaidat,et al. Smart Cities and Homes: Key Enabling Technologies , 2016 .
[20] Paul Suetens,et al. meshSIFT: Local surface features for 3D face recognition under expression variations and partial data , 2013, Comput. Vis. Image Underst..
[21] Lihua Huang,et al. Cloud Computing and the Internet of Things: Technology Innovation in Automobile Service , 2013, HCI.
[22] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[23] Andrea Tagliasacchi,et al. Sphere-meshes for real-time hand modeling and tracking , 2016, ACM Trans. Graph..
[24] Chao Li,et al. SemanMedical: A kind of semantic medical monitoring system model based on the IoT sensors , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).
[25] Borhanuddin Mohd Ali,et al. A Network Mobility Solution Based on 6LoWPAN Hospital Wireless Sensor Network (NEMO-HWSN) , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[26] Doroteo Torre Toledano,et al. Emulating DNA: Rigorous Quantification of Evidential Weight in Transparent and Testable Forensic Speaker Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.
[27] Antonio F. Gómez-Skarmeta,et al. Drugs interaction checker based on IoT , 2010, 2010 Internet of Things (IOT).
[28] Shiv Ram Dubey,et al. Identity verification using shape and geometry of human hands , 2015, Expert Syst. Appl..
[29] Dacheng Tao,et al. Multi-Task Pose-Invariant Face Recognition , 2015, IEEE Transactions on Image Processing.
[30] Begonya Garcia-Zapirain,et al. Gait Analysis Methods: An Overview of Wearable and Non-Wearable Systems, Highlighting Clinical Applications , 2014, Sensors.
[31] Ying Shen,et al. Towards contactless palmprint recognition: A novel device, a new benchmark, and a collaborative representation based identification approach , 2017, Pattern Recognit..
[32] Juan Ruiz-Alzola,et al. Biometric identification systems , 2003, Signal Process..
[33] Sarmistha Neogy,et al. Enabling agricultural automation to optimize utilization of water, fertilizer and insecticides by implementing Internet of Things (IoT) , 2016, 2016 International Conference on Information Technology (InCITe) - The Next Generation IT Summit on the Theme - Internet of Things: Connect your Worlds.
[34] Ajay Kumar,et al. Personal Authentication Using Hand Vein Triangulation and Knuckle Shape , 2009, IEEE Transactions on Image Processing.
[35] John Daugman. How iris recognition works , 2004 .
[36] Anil K. Jain,et al. Handbook of Face Recognition, 2nd Edition , 2011 .
[37] Miao Yun,et al. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid , 2010, 2010 International Conference on Advances in Energy Engineering.
[38] Antonio Iera,et al. A systemic and cognitive approach for IoT security , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[39] Peter Semmelhack. Social Machines: How to Develop Connected Products That Change Customers' Lives , 2013 .
[40] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[41] Dieter Hayn,et al. The Internet of Things for Ambient Assisted Living , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[42] Yonghui Zhang,et al. Intelligent Monitoring System on Refrigerator Trucks Based on the Internet of Things , 2011 .
[43] Yifan Bo,et al. The Application of Cloud Computing and the Internet of Things in Agriculture and Forestry , 2011, 2011 International Joint Conference on Service Sciences.
[44] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[45] Hannu Tenhunen,et al. Smart e-Health Gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[46] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[47] Zhenhua Guo,et al. Hierarchical multiscale LBP for face and palmprint recognition , 2010, 2010 IEEE International Conference on Image Processing.
[48] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[49] Tardi Tjahjadi,et al. Silhouette-based gait recognition using Procrustes shape analysis and elliptic Fourier descriptors , 2012, Pattern Recognit..
[50] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[51] Hongyu Li,et al. 3D Palmprint Identification Using Block-Wise Features and Collaborative Representation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[52] Réjean Plamondon,et al. Signature Verification Based on the Kinematic Theory of Rapid Human Movements , 2017, IEEE Transactions on Human-Machine Systems.
[53] Juan I. Nieto-Hipólito,et al. A proposal for using the internet of things concept to increase children's health awareness , 2012, CONIELECOMP 2012, 22nd International Conference on Electrical Communications and Computers.
[54] Mohammad S. Obaidat,et al. A robust ElGamal‐based password‐authentication protocol using smart card for client‐server communication , 2017, Int. J. Commun. Syst..
[55] J. Wareham,et al. A Smart City Initiative: the Case of Barcelona , 2012, Journal of the Knowledge Economy.
[56] Youbao Tang,et al. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform , 2014, IEEE Transactions on Information Forensics and Security.
[57] F. Zernike,et al. Diffraction Theory of the Knife-Edge Test and its Improved Form, The Phase-Contrast Method , 1934 .
[58] Neucimar Jerônimo Leite,et al. A New Framework for Quality Assessment of High-Resolution Fingerprint Images , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[59] Tanmoy Maitra,et al. An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment , 2014, Journal of Medical Systems.
[60] Chun-Wei Tan,et al. Accurate Iris Recognition at a Distance Using Stabilized Iris Encoding and Zernike Moments Phase Features , 2014, IEEE Transactions on Image Processing.
[61] Bo Yang,et al. Smart home research , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[62] Weiming Shen,et al. A home mobile healthcare system for wheelchair users , 2014, Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[63] Huang Yue-shan,et al. A Community Health Service Architecture Based on the Internet of Things on Health-Care , 2013 .
[64] Jie Chen,et al. Fusing Local Patterns of Gabor Magnitude and Phase for Face Recognition , 2010, IEEE Transactions on Image Processing.
[65] Antonio Iera,et al. SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.
[66] Wenbo He,et al. A Reservation-based Smart Parking System , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[67] Athanasios V. Vasilakos,et al. A Survey on Ambient Intelligence in Healthcare , 2013, Proceedings of the IEEE.
[68] Arun Ross,et al. Periocular Biometrics in the Visible Spectrum , 2011, IEEE Transactions on Information Forensics and Security.
[69] R. S. H. Istepanian,et al. The potential of Internet of m-health Things “m-IoT” for non-invasive glucose level sensing , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[70] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[71] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[72] Matthew E Falagas,et al. Counterfeit or substandard antimicrobial drugs: a review of the scientific evidence. , 2007, The Journal of antimicrobial chemotherapy.
[73] Luca Veltri,et al. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.
[74] Wonjun Hwang,et al. Face Recognition System Using Multiple Face Model of Hybrid Fourier Feature Under Uncontrolled Illumination Variation , 2011, IEEE Transactions on Image Processing.
[75] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[76] Chun-Wei Tan,et al. Unified Framework for Automated Iris Segmentation Using Distantly Acquired Face Images , 2012, IEEE Transactions on Image Processing.