A palmprint-based cryptosystem using double encryption
暂无分享,去创建一个
[1] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[2] Santanu Chaudhury,et al. Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[3] Ron,et al. The RSA Algorithm , 2009 .
[4] Helen C. Shen,et al. Personal authentication using hand images , 2006, Pattern Recognit. Lett..
[5] Anil K. Jain,et al. Fuzzy Fingerprint Vault , 2004 .
[6] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] David Zhang,et al. On-Line Palmprint Identification , 2005 .
[8] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[9] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[10] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[11] Chu-Hsing Lin,et al. A flexible biometrics remote user authentication scheme , 2004, Comput. Stand. Interfaces.
[12] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[13] Tieniu Tan,et al. Ordinal palmprint represention for personal identification [represention read representation] , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[14] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[15] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[16] David Zhang,et al. Personal authentication using multiple palmprint representation , 2005, Pattern Recognit..
[17] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[18] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[19] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.