-
1
-
-
84962799390
-
Cryptography by Pseudo Random Number Generator
-
Bulgaria
-
S.E. Borujeni, Cryptography by Pseudo Random Number Generator, IEEE Int Symposium on Intelligent Systems 1 (2002), 244-247, Bulgaria.
-
(2002)
IEEE Int Symposium on Intelligent Systems
, vol.1
, pp. 244-247
-
-
Borujeni, S.E.1
-
2
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman, The importance of being random: statistical principles of iris recognition, Pattern Recognition 36 (2003), 279-291.
-
(2003)
Pattern Recognition
, vol.36
, pp. 279-291
-
-
Daugman, J.1
-
3
-
-
34547730054
-
Method and Device for Decryption Secure Transfer of Data
-
PCT Patent Application, PCT WO 2004/021694
-
R. Eckmiller, O. Baruth and D. Neumann, Method and Device for Decryption Secure Transfer of Data, PCT Patent Application, PCT WO 2004/021694, 2004.
-
(2004)
-
-
Eckmiller, R.1
Baruth, O.2
Neumann, D.3
-
4
-
-
22044457718
-
Tunable retina encoders for retina implants: Why and how
-
Feb
-
R. Eckmiller, D. Neumann and O. Baruth, Tunable retina encoders for retina implants: why and how, JNE, Journal of Neural Engineering - Special Issue: The Eye and the Chip 2(1) (Feb. 2005), 91-104.
-
(2005)
JNE, Journal of Neural Engineering - Special Issue: The Eye and the Chip
, vol.2
, Issue.1
, pp. 91-104
-
-
Eckmiller, R.1
Neumann, D.2
Baruth, O.3
-
5
-
-
24944446893
-
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
-
A.M. Fiskiran and R.B. Lee, On-Chip Lookup Tables for Fast Symmetric-Key Encryption, ASAP, 16th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP'05), 2003, 356-363.
-
(2003)
ASAP, 16th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP'05)
, pp. 356-363
-
-
Fiskiran, A.M.1
Lee, R.B.2
-
6
-
-
0035504620
-
On Optimal Permutation Codes
-
V.K. Goyal, S.A. Savari and W. Wang, On Optimal Permutation Codes, IEEE Trans Information Theory 47(7) (2001), 2961-2971.
-
(2001)
IEEE Trans Information Theory
, vol.47
, Issue.7
, pp. 2961-2971
-
-
Goyal, V.K.1
Savari, S.A.2
Wang, W.3
-
7
-
-
0003807773
-
-
S. Haykin, ed, New Jersey: Prentice Hall, 4th Edition
-
S. Haykin, ed., Adaptive Filter Theory, New Jersey: Prentice Hall, 4th Edition, 2002.
-
(2002)
Adaptive Filter Theory
-
-
-
8
-
-
0033730804
-
Filterbank-based fingerprint matching
-
A. Jain, S. Prabhakar, L. Hong and S. Pankanti, Filterbank-based fingerprint matching, IEEE Transactions on Image Processing 9(5) (2000), 846-859.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.5
, pp. 846-859
-
-
Jain, A.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
9
-
-
26444612901
-
Fingerprint classification, and matching
-
A. Bovik, ed, Academic Press, April
-
A. Jain and S. Prabhakar, Fingerprint classification, and matching, in: Handbook for Image and Video Processing, A. Bovik, ed., Academic Press, April 2000.
-
(2000)
Handbook for Image and Video Processing
-
-
Jain, A.1
Prabhakar, S.2
-
10
-
-
0035517885
-
Cryptography Efficient Permutation Instructions for Fast Software
-
R.B. Lee, Z. Shi and X. Yang, Cryptography Efficient Permutation Instructions for Fast Software, IEEE Micro 21(6) (2001), 56-69.
-
(2001)
IEEE Micro
, vol.21
, Issue.6
, pp. 56-69
-
-
Lee, R.B.1
Shi, Z.2
Yang, X.3
-
11
-
-
0004255908
-
-
T.M. Mitchel, ed, New York: McGraw Hill
-
T.M. Mitchel, ed., Machine Learning, New York: McGraw Hill, 1997.
-
(1997)
Machine Learning
-
-
-
12
-
-
34547747695
-
-
A. Mitra, Y.S. Rado and S. Prasanna, A New Image Encryption Approach Using Combinational Permutation Techniques, International Journal of Computer Science 1(2) (2006), 127-131.
-
A. Mitra, Y.S. Rado and S. Prasanna, A New Image Encryption Approach Using Combinational Permutation Techniques, International Journal of Computer Science 1(2) (2006), 127-131.
-
-
-
-
13
-
-
33749862504
-
-
D. Neumann, R. Eckmiller and O. Baruth, Development of a Neural Net-Based, Personalized Secure Communication Link, Proc of the Int Conf on Artificial Neural Networks, (ICANN) 2006 4131 (2006), 340-348.
-
D. Neumann, R. Eckmiller and O. Baruth, Development of a Neural Net-Based, Personalized Secure Communication Link, Proc of the Int Conf on Artificial Neural Networks, (ICANN) 2006 4131 (2006), 340-348.
-
-
-
-
14
-
-
34547811875
-
An Image Encryption Method with Magnitude and Phase Manipulation Using Carrier Images
-
S. Prasanna, Y.S. Rao and A. Mitra, An Image Encryption Method with Magnitude and Phase Manipulation Using Carrier Images, International Journal of Computer Science 1(2) (2006), 132-138.
-
(2006)
International Journal of Computer Science
, vol.1
, Issue.2
, pp. 132-138
-
-
Prasanna, S.1
Rao, Y.S.2
Mitra, A.3
-
16
-
-
0003851399
-
-
B. Schneier, ed, New York: John Wiley and Sohns, 2nd Edition
-
B. Schneier, ed., Applied Cryptography: Protocols, Algorithms, and Source Code in C, New York: John Wiley and Sohns, 2nd Edition, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
-
17
-
-
84921399937
-
-
J. Si, A.G. Barto, W.B. Powell, and I.D. Wunsch, eds, Piscataway: IEEE Press and New York: Wiley-Interscience
-
J. Si, A.G. Barto, W.B. Powell, and I.D. Wunsch, eds, Handbook of Learning and Approximate Dynamic Programming, Piscataway: IEEE Press and New York: Wiley-Interscience, 2004.
-
(2004)
Handbook of Learning and Approximate Dynamic Programming
-
-
-
18
-
-
8344236959
-
Biometric Encryption
-
chapter 22, R.K. Nichols, ed, McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and K.V. Kumar, Biometric Encryption, in: ICSA Guide to Cryptography, (chapter 22), R.K. Nichols, ed., McGraw-Hill, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, K.V.5
-
20
-
-
35048866533
-
Fingerprint Classification: An Approach Based on Singularities and Analysis of Fingerprint Structure
-
Hong Kong, China
-
X. Wand and M. Xie, Fingerprint Classification: An Approach Based on Singularities and Analysis of Fingerprint Structure, Biometric Authentication, First International Conference (IC-BA) 3072 (2004), 324-329, Hong Kong, China.
-
(2004)
Biometric Authentication, First International Conference (IC-BA)
, vol.3072
, pp. 324-329
-
-
Wand, X.1
Xie, M.2
|