A Study on the Convergence of FingerHashing and a Secured Biometric System
暂无分享,去创建一个
[1] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.
[2] Raul Sánchez-Reillo. Including Biometric Authentication in a Smart Card Operating System , 2001, AVBPA.
[3] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[4] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[5] David Chek Ling Ngo,et al. PalmHashing: A novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.
[6] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[7] Loris Nanni,et al. Empirical tests on BioHashing , 2006, Neurocomputing.
[8] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Loris Nanni,et al. An efficient fingerprint verification system using integrated gabor filters and Parzen Window Classifier , 2005, Neurocomputing.
[10] Yoshiaki Isobe,et al. Development of personal authentication system using fingerprint with digital signature technologies , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[11] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[12] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[13] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[14] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[15] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[16] Luciano Rila. Denial of Access in Biometrics-Based Authentication Systems , 2002, InfraSec.
[17] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[18] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[19] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[20] Mohammed Yakoob Siyal,et al. Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..
[21] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[22] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[23] Loris Nanni,et al. Letters Empirical tests on BioHashing , 2006 .