BIOMETRICS FOR COMPUTER SECURITY AND CRYPTOGRAPHY
暂无分享,去创建一个
[1] Michael K. Reiter,et al. Cryptographic Key Generation from Voice (Extended Abstract) , 2001 .
[2] Ibrahim Sogukpinar,et al. Understanding users' keystroke patterns for computer access security , 2003, Comput. Secur..
[3] Stephen M. Matyas,et al. Generating user-based cryptographic keys and random numbers , 1999, Comput. Secur..
[4] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[5] A. Murat Tekalp,et al. Joint audio-video processing for biometric speaker identification , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[6] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[7] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[8] Bhagavatula Vijaya Kumar,et al. Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.