-
1
-
-
0004192381
-
-
USA: CRC Press, pp
-
A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography, USA: CRC Press, pp 180, 1997.
-
(1997)
Handbook of Applied Cryptography
, pp. 180
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
2
-
-
0040231044
-
Foiling the Cracker: A Survey of, and Improvements to, Password Security
-
D. V. Klein, "Foiling the Cracker: A Survey of, and Improvements to, Password Security," in Proceedings of the 2nd USENDIX UNDIX Security Workshop, pp. 5-14, 1990.
-
(1990)
Proceedings of the 2nd USENDIX UNDIX Security Workshop
, pp. 5-14
-
-
Klein, D.V.1
-
3
-
-
34249733184
-
Improving password security and memorability to protect personal and organizational information
-
K.-P. L. Vu, R. W. Proctor, A. Bhargav-Spantzel, B.-L. Tai, J. Cook, and E. Eugene Schultz, "Improving password security and memorability to protect personal and organizational information," International Journal of Human-Computer Studies, vol. 65, pp. 744-757, 2007.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, pp. 744-757
-
-
Vu, K.-P.L.1
Proctor, R.W.2
Bhargav-Spantzel, A.3
Tai, B.-L.4
Cook, J.5
Eugene Schultz, E.6
-
4
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: issues and challenges," in Proceedings of the IEEE, vol. 92, pp. 948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
6
-
-
0034829626
-
-
F. Monrose, M. K. Reiter, L. Qi, and S. Wetzel, Cryptographic key generation from voice, in Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, pp. 202-213, 2001.
-
F. Monrose, M. K. Reiter, L. Qi, and S. Wetzel, "Cryptographic key generation from voice," in Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, pp. 202-213, 2001.
-
-
-
-
7
-
-
0033281339
-
A fuzzy commitment scheme
-
Singapore, pp
-
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proceedings of the 6th ACM conference on Computer and communications security, Kent Ridge Digital Labs, Singapore, pp. 28-36, 1999.
-
(1999)
Proceedings of the 6th ACM conference on Computer and communications security, Kent Ridge Digital Labs
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
8
-
-
33747624401
-
Combining Crypto with Biometrics Effectively
-
F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively," IEEE Transactions on Computers, vol. 55, pp. 1081-1088, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
10
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
11
-
-
27944468741
-
A biometric-based scheme for enhancing security of cryptographic keys
-
M. Y. Siyal and F. Ahmed, "A biometric-based scheme for enhancing security of cryptographic keys," in 2004 IEEE Region 10 Conference TENCON 2004., Vol. 2, pp. 407-410, 2004.
-
(2004)
2004 IEEE Region 10 Conference TENCON
, vol.2
, pp. 407-410
-
-
Siyal, M.Y.1
Ahmed, F.2
-
12
-
-
19444362827
-
A novel approach for regenerating a private key using password, fingerprint and smart card
-
F. Ahmed and M. Y. Siyal, "A novel approach for regenerating a private key using password, fingerprint and smart card," Information Management & Computer Security, vol. 13, p. 39, 2005.
-
(2005)
Information Management & Computer Security
, vol.13
, pp. 39
-
-
Ahmed, F.1
Siyal, M.Y.2
-
13
-
-
33746368690
-
Biometric hash: High-confidence face recognition
-
D. C. L. Ngo, A. B. J. Teoh, and A. Goh, "Biometric hash: high-confidence face recognition," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 16, pp. 771-775, 2006.
-
(2006)
Circuits and Systems for Video Technology, IEEE Transactions on
, vol.16
, pp. 771-775
-
-
Ngo, D.C.L.1
Teoh, A.B.J.2
Goh, A.3
-
15
-
-
84937704662
-
Secure smartcard based fingerprint authentication
-
Berkley, California, pp
-
T. C. Clancy, K. Negar, and J. L. Dennis, "Secure smartcard based fingerprint authentication," in Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, Berkley, California, pp. 45-52, 2003.
-
(2003)
Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
, pp. 45-52
-
-
Clancy, T.C.1
Negar, K.2
Dennis, J.L.3
-
16
-
-
26444525625
-
Fuzzy Vault for Fingerprints
-
U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy Vault for Fingerprints," in Audio- and Video-Based Biometric Person Authentication, pp. 310-319, 2005.
-
(2005)
Audio- and Video-Based Biometric Person Authentication
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
18
-
-
0027235180
-
Pattern Recognition Using Invariants Defined From Higher Order Spectra- One Dimensional Inputs
-
V. Chandran and S. L. Elgar, "Pattern Recognition Using Invariants Defined From Higher Order Spectra- One Dimensional Inputs," IEEE Transactions on Signal Processing, vol. 41, p. 205, 1993.
-
(1993)
IEEE Transactions on Signal Processing
, vol.41
, pp. 205
-
-
Chandran, V.1
Elgar, S.L.2
-
19
-
-
0003589319
-
IEEE standard for binary floating-point arithmetic
-
ANSI/IEEE Std 754-1985
-
"IEEE standard for binary floating-point arithmetic," ANSI/IEEE Std 754-1985, 1985.
-
(1985)
-
-
-
20
-
-
33745164328
-
Overview of the face recognition grand challenge
-
Washington, DC, USA, pp
-
P. J. Phillips, P. J. Flynn, T. Scruggs, Kevin W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, "Overview of the face recognition grand challenge," in Proc. of IEEE Comp. Society Conf. on Computer Vision and Pattern Recognition (CVPR'05)-Vol. 1,Washington, DC, USA, pp. 947-954, 2005.
-
(2005)
Proc. of IEEE Comp. Society Conf. on Computer Vision and Pattern Recognition (CVPR'05)
, vol.1
, pp. 947-954
-
-
Phillips, P.J.1
Flynn, P.J.2
Scruggs, T.3
Bowyer, K.W.4
Chang, J.5
Hoffman, K.6
Marques, J.7
Min, J.8
Worek, W.9
|