暂无分享,去创建一个
Mehmet Aydar | Serkan Ayvaz | Betul Aygun | Salih Cemil Cetin | S. Ayvaz | Betül Aygün | Mehmet Aydar | S. Cetin
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[3] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[4] Kms Perera,et al. Biometric Signatures and Elliptic Curve Cryptography for Internet based Applications , 2017 .
[5] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Naser Damer,et al. Fingerprint and Iris Multi-Biometric Data Indexing and Retrieval , 2018, 2018 21st International Conference on Information Fusion (FUSION).
[7] Chia-Chen Lin,et al. Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication , 2018, Sustainability.
[8] Tran Quang Duc,et al. A Biometrics Encryption Key algorithm to protect private key in BioPKI based security system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).
[9] Debnath Bhattacharyya,et al. Biometric Authentication: A Review , 2009 .
[10] Yen-Lung Lai,et al. Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint , 2018, ICAIP '18.
[11] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[12] Tsuyoshi Murata,et al. {m , 1934, ACML.
[13] R Kavya,et al. Survey on Encryption Approaches for Secure Face Biometrics , 2018 .
[14] K. Duraiswamy,et al. Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris , 2010, ArXiv.
[15] Chiranji Lal Chowdhary. Analysis of Unimodal and Multimodal Biometric System , 2019 .
[16] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[17] Michaël Rusinowitch,et al. Automated Verification of Electrum Wallet , 2016, Financial Cryptography Workshops.
[18] Anil K. Jain,et al. Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[19] A. Lynn Abbott,et al. Biometric authentication using photoplethysmography signals , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[20] Taekyoung Kwon,et al. Practical Digital Signature Generation Using Biometrics , 2004, ICCSA.
[21] Neha Bansal. Enhanced RSA Key Generation Modelling Using Fingerprint Biometric , 2018 .
[22] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[23] Akio Tojo,et al. Fingerprint pattern classification , 1984, Pattern Recognit..
[24] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[25] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.
[26] Adi Shamir,et al. How to share a secret , 1979, CACM.
[27] Mohammed Yakoob Siyal,et al. Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..
[28] Andreas Uhl,et al. Context-based biometric key generation for Iris , 2011 .
[29] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[30] Samiran Chattopadhyay,et al. Fingerprint-based crypto-biometric system for network security , 2015, EURASIP J. Inf. Secur..
[31] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[32] Ian Michael Trotter,et al. Mapping Fingerprints to Unique Numbers , 2007 .
[33] Zarul Fitri Zaaba,et al. An assessment of user authentication methods in mobile phones , 2018 .
[34] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.