Internet Security Using Biometrics
暂无分享,去创建一个
[1] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[2] Rama Chellappa,et al. Handbook of Remote Biometrics , 2009, Advances in Pattern Recognition.
[3] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[4] Arun Ross,et al. Handbook of Biometrics , 2007 .
[5] Nalini K. Ratha,et al. Biometrics break-ins and band-aids , 2003, Pattern Recognit. Lett..
[6] J. L. Wayman,et al. Best practices in testing and reporting performance of biometric devices. , 2002 .
[7] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[8] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[9] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[10] Radia Perlman,et al. Network Security , 2002 .
[11] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[12] Gerhard Eschelbeck. Active Security - A proactive approach for computer security systems , 2000, J. Netw. Comput. Appl..
[13] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[14] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..