메뉴 건너뛰기




Volumn 5259 LNCS, Issue , 2008, Pages 38-44

Network security using biometric and cryptography

Author keywords

Biometric; Cryptography; DES; MD5; Watermarking

Indexed keywords

BIOMETRICS; COMPUTER VISION; CRYPTOGRAPHY; DIGITAL WATERMARKING;

EID: 57049134655     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88458-3_4     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 5
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an offline biometric based identification scheme
    • Davida, G.I., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme. In: Proceedings Workshop Coding and Cryptography, pp. 129-138 (1999)
    • (1999) Proceedings Workshop Coding and Cryptography , pp. 129-138
    • Davida, G.I.1    Matt, B.J.2    Peralta, R.3
  • 13
    • 57049141049 scopus 로고    scopus 로고
    • Schenier, B.: Applied Cryptography Protocol, Algorithms, and Source Code in C, 2nd edn., p. 184. Wiley Computer Publishing/John Wiley and Sons, Chichester (1996)
    • Schenier, B.: Applied Cryptography Protocol, Algorithms, and Source Code in C, 2nd edn., p. 184. Wiley Computer Publishing/John Wiley and Sons, Chichester (1996)
  • 14
    • 0242372124 scopus 로고    scopus 로고
    • Choi, J.G., Sakurai, K., Park, J.H.: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, 2846, pp. 265-279. Springer, Heidelberg (2003)
    • Choi, J.G., Sakurai, K., Park, J.H.: Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 265-279. Springer, Heidelberg (2003)
  • 16
    • 35048873815 scopus 로고    scopus 로고
    • Goi, B.M., Phan, R.C.W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of two anonymous buyerseller watermarking protocols and an improvement for true anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, 3089, pp. 369-382. Springer, Heidelberg (2004)
    • Goi, B.M., Phan, R.C.W., Yang, Y., Bao, F., Deng, R.H., Siddiqi, M.U.: Cryptanalysis of two anonymous buyerseller watermarking protocols and an improvement for true anonymity. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 369-382. Springer, Heidelberg (2004)
  • 17
    • 35248849802 scopus 로고    scopus 로고
    • An anonymous buyer-seller watermarking protocol with anonymity control
    • Lee, P.J, Lim, C.H, eds, ICISC 2002, Springer, Heidelberg
    • Ju, H.S., Kim, H.J., Lee, D.H., Lim, J.I.: An anonymous buyer-seller watermarking protocol with anonymity control. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 421-432. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2587 , pp. 421-432
    • Ju, H.S.1    Kim, H.J.2    Lee, D.H.3    Lim, J.I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.