Evolving authentication design considerations for the Internet of biometric things (IoBT)
暂无分享,去创建一个
[1] Burak Kantarci,et al. Towards secure cloud-centric Internet of Biometric Things , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).
[2] Wang Jingli,et al. The design of teaching management system in universities based on biometrics identification and the Internet of Things technology , 2015, 2015 10th International Conference on Computer Science & Education (ICCSE).
[3] Fatemeh Tehranipoor,et al. DRAM based Intrinsic Physical Unclonable Functions for System Level Security , 2015, ACM Great Lakes Symposium on VLSI.
[4] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[5] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[6] Chun-Liang Lin,et al. Personalized information encryption using ECG signals with chaotic functions , 2012, Inf. Sci..
[7] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[8] 斯特凡娜·布隆德奥. Biometric personal authentication , 2013 .
[9] Jingli Wang. The design of teaching management system in universities based on biometrics identification and the Internet of Things technology , 2015, ICCSE 2015.
[10] Theodore Tryfonas,et al. The Internet of Things: a security point of view , 2016, Internet Res..
[11] Dimitrios Hatzinakos,et al. ECG biometric analysis in cardiac irregularity conditions , 2009, Signal Image Video Process..
[12] Willis J. Tompkins,et al. A Real-Time QRS Detection Algorithm , 1985, IEEE Transactions on Biomedical Engineering.
[13] Bsava. New website: Announcing BSAVA’s new website , 2016 .
[14] Joseph A. O'Sullivan,et al. ECG Biometric Recognition: A Comparative Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[15] Yacine Challal,et al. A Systemic Approach for IoT Security , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.
[16] Mark Mohammad Tehranipoor,et al. Hardware security meets biometrics for the age of IoT , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).
[17] Dimitrios Hatzinakos,et al. ECG Pattern Analysis for Emotion Detection , 2012, IEEE Transactions on Affective Computing.
[18] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[19] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[20] Mark Mohammad Tehranipoor,et al. Highly Reliable Key Generation From Electrocardiogram (ECG) , 2017, IEEE Transactions on Biomedical Engineering.
[21] L. Biel,et al. ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).
[22] Jiankun Hu,et al. ECG-Based Authentication , 2010, Handbook of Information and Communication Security.
[23] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[24] Fatemeh Tehranipoor,et al. Robust hardware true random number generators using DRAM remanence effects , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[25] M. Grgic,et al. A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[26] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[27] Ola Pettersson,et al. ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..
[28] T AndreaRinaldi. Biometrics ’ new identity — measuring more physical and biological traits Research into the characteristics that are unique to an individual is addressing the need to correctly identify people in a variety of medical , social and security contexts , 2015 .
[29] Fatemeh Tehranipoor,et al. A novel way to authenticate untrusted Integrated Circuits , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).