The potential use of smart cards in vehicle management with particular reference to the situation in Western Australia
暂无分享,去创建一个
[1] Viiveke Fåk,et al. Computer verification of human users' identity: A theoretical model and some evaluation criteria , 1991, Comput. Secur..
[2] D. J. Clark,et al. Results of the Cambridge experiment in congestion management , 1994 .
[3] J.-J. Quisquater,et al. SCALPS: Smart card for limited payment systems , 1996, IEEE Micro.
[4] David M'Raïhi,et al. Cryptographic smart cards , 1996, IEEE Micro.
[5] Ching Y. Suen,et al. A fast parallel algorithm for thinning digital patterns , 1984, CACM.
[6] Jason Reid,et al. Making Sense of Smart Card Security Certifications , 2000, CARDIS.
[7] Joseph P. Campbell,et al. Update on the US Government's Biometric Consortium , 1997 .
[8] Suzanne Stevens,et al. To Russia with love. , 1997, CDS review.
[9] D. M. Weber,et al. A cost effective fingerprint verification algorithm for commercial applications , 1992, Proceedings of the 1992 South African Symposium on Communications and Signal Processing.
[10] Ernst Bovelander,et al. Smartcards and biometrics: an overview☆ , 1995 .
[11] Ware Myers. On Trial at the Summer Olympic Games: Smart Cards , 1996, Computer.
[12] R. K. Jurgen. The electronic motorist , 1995 .
[13] S. W. Redfern. A radar based mass movement sensor for automotive security applications , 1993 .
[14] Jose M. Oton,et al. Smart cards , 1994 .
[15] Ron Morris,et al. Integrated Circuit Cards , 1999 .
[16] Jerome Svigals. Smart cards: The ultimate personal computer , 1985 .
[17] C Devery,et al. Patterns of motor vehicle theft , 1993 .
[18] Andreas Crede,et al. Electronic Commerce and the Banking Industry: The Requirement and Opportunities for New Payment Systems Using the Internet , 2006, J. Comput. Mediat. Commun..
[19] Josep Domingo-Ferrer,et al. A Performance Comparison of Java Cards for Micropayment Implementation , 2000, CARDIS.
[20] Dave Andrews,et al. PCs catch criminals using fingerprint analysis , 1993 .
[21] Benjamin Arazi. Vehicular implementations of public key cryptographic techniques , 1991 .
[22] Dave Sims,et al. Decriminalizing the fingerprint , 1994, IEEE Computer Graphics and Applications.
[23] Hyun-jung Kim. Biometrics, is it a viable proposition for identity authentication and access control? , 1995, Comput. Secur..
[24] Anil K. Jain,et al. Adaptive flow orientation-based feature extraction in fingerprint images , 1995, Pattern Recognit..
[25] Ying Shan,et al. Fingerprint preclassification using key-points , 1994, Proceedings of ICSIPNN '94. International Conference on Speech, Image Processing and Neural Networks.
[26] C. H. Kuo,et al. A topology-based matching algorithm for fingerprint authentication , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.
[27] Ying Sun,et al. Hybrid optical/digital access control using fingerprint identification , 1995 .
[28] M. Kamijo. Classifying fingerprint images using neural network: deriving the classification state , 1993, IEEE International Conference on Neural Networks.
[29] M. Higgs. Smartcards-the key to unlocking revenue growth , 1996 .
[30] C. H. Fancher. In your pocket: smartcards , 1997 .
[31] P. Wallich. How to steal millions in chump change. , 1999, Scientific American.