메뉴 건너뛰기




Volumn B, Issue , 2004, Pages

A biometric-based scheme for enhancing security of cryptographic keys

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA PRIVACY; PATTERN RECOGNITION; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 27944468741     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (12)
  • 6
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • Hao Feng, Chan Choong Wah, "Private Key Generation from On-Line Handwritten Signatures", Information Management & Computer Security, Vol. 10, No. 4, pp. 159-164, 2002.
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Feng, H.1    Chan Choong Wah2
  • 8
    • 27944488591 scopus 로고    scopus 로고
    • Tamper-resistant smart cards - Too much to ask for?
    • Ville Taponen, "Tamper-resistant Smart Cards - Too Much To Ask For?", Helsinki University of Technology, 2000.
    • (2000) Helsinki University of Technology
    • Taponen, V.1
  • 10
    • 0031233235 scopus 로고    scopus 로고
    • An identity authentication system using fingerprints
    • A.K. Jain, L. Hong, S. Pankanti and R. Bolle, "An Identity Authentication System Using Fingerprints", Proc. IEEE, Vol. 85, No. 9, pp. 1365-1388, 1997.
    • (1997) Proc. IEEE , vol.85 , Issue.9 , pp. 1365-1388
    • Jain, A.K.1    Hong, L.2    Pankanti, S.3    Bolle, R.4
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • Adi Shamir, "How to Share a Secret", Communications of the ACM, Vol. 22, No. 11, pp. 612-613, November, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.