Biometric Cryptosystem Scheme for Internet of Things using Fuzzy Commitment principle
暂无分享,去创建一个
Abdallah Meraoumia | Salim Chitroub | Hakim Bendjenna | Atef Bentahar | Abdelhakim Zeroual | S. Chitroub | A. Meraoumia | H. Bendjenna | Abdelhakim Zeroual | Atef Bentahar
[1] Dario Maio,et al. Direct Gray-Scale Minutiae Detection In Fingerprints , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Marco Gamassi,et al. Fingerprint local analysis for high-performance minutiae extraction , 2005, IEEE International Conference on Image Processing 2005.
[3] Kavita Tewari,et al. Fingerprint Recognition and feature extraction using transform domain techniques , 2015, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).
[4] Sasa Adamovic,et al. Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics , 2017, IET Biom..
[5] M. Hossein Ahmadzadegan,et al. Security challenges in internet of things: survey , 2017, 2017 IEEE Conference on Wireless Sensors (ICWiSe).
[6] Thuc Dinh Nguyen,et al. Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.
[7] Ingrid Moerman,et al. IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.
[8] Chao Gao,et al. Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.
[9] Jian Chen,et al. Radio Frequency Fingerprint Extraction of Radio Emitter Based on I/Q Imbalance , 2017 .
[10] T. Amornraksa,et al. A fingerprint matching method using DCT features , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..
[11] Annies Joshy,et al. Design and implementation of an IoT based secure biometric authentication system , 2017, 2017 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES).
[12] Anil K. Jain,et al. Fingerprint Classification Using Orientation Field Flow Curves , 2004, ICVGIP.
[13] S. Srinivasan,et al. A survey on biometric based authentication in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[14] Mark Mohammad Tehranipoor,et al. Hardware security meets biometrics for the age of IoT , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).
[15] Ricardo Neisse,et al. DIAT: A Scalable Distributed Architecture for IoT , 2015, IEEE Internet of Things Journal.
[16] Naveed Riaz,et al. Biometric template security: an overview , 2018 .
[17] Ammar Rayes,et al. Internet of Things Security and Privacy , 2017 .
[18] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[19] Arjan Kuijper,et al. Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[20] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[21] Zhao Yong,et al. DCT fingerprint classifier based group fingerprint , 2014, 2014 International Conference on Audio, Language and Image Processing.
[22] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[23] Evgeny M. Khorov,et al. A survey on IEEE 802.11ah: An enabling networking technology for smart cities , 2015, Comput. Commun..
[24] Du Yuanfeng,et al. A Fingerprint Recognition Algorithm Based on Principal Component Analysis , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.