-
2
-
-
36849070972
-
Three measures for secure palmprint identification
-
Kong A., Zhang D., Kamel M., Three measures for secure palmprint identification Pattern Recognition 2008 41 4 1329 1337
-
(2008)
Pattern Recognition
, vol.41
, Issue.4
, pp. 1329-1337
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
3
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha N. K., Connell J. H., Bolle R. M., Enhancing security and privacy in biometrics-based authentication systems IBM Systems Journal 2001 40 3 614 634
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
5
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., Won D., Security weakness in a three-party pairing-based protocol for password authenticated key exchange Information Sciences 2007 177 6 1364 1375
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
7
-
-
26444525625
-
Fuzzy vault for fingerprints
-
(AVBPA 05) July 2005 Hilton Rye Town, NY, USA Springer Lecture Notes in Computer Science
-
Uludag U., Pankanti S., Jain A. K., Fuzzy vault for fingerprints 3546 Proceedings of the 5th Audio- and Video-Based Biometric Person Authentication (AVBPA 05) July 2005 Hilton Rye Town, NY, USA Springer 310 319 Lecture Notes in Computer Science
-
Proceedings of the 5th Audio- And Video-Based Biometric Person Authentication
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
8
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
May 1998 Oakland, Calif, USA
-
Davida G. I., Frankel Y., Matt B. J., On enabling secure applications through off-line biometric identification Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy May 1998 Oakland, Calif, USA 148 157
-
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
9
-
-
70449337545
-
Biometric encryption
-
Sautar C., Roberge D., Stoianov A., Gilroy R., Vijaya Kumar B. V. K., Biometric encryption Information Management and Computer Security 2001 9 5 205 212
-
(2001)
Information Management and Computer Security
, vol.9
, Issue.5
, pp. 205-212
-
-
Sautar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
11
-
-
9944223229
-
PalmHashing: A novel approach for cancelable biometrics
-
Connie T., Teoh A., Goh M., Ngo D., PalmHashing: a novel approach for cancelable biometrics Information Processing Letters 2005 93 1 1 5
-
(2005)
Information Processing Letters
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
12
-
-
33646095185
-
An analysis of BioHashing and its variants
-
Kong A., Cheung K.-H., Zhang D., Kamel M., You J., An analysis of BioHashing and its variants Pattern Recognition 2006 39 7 1359 1368
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
13
-
-
70449365255
-
-
http://searchsecurity.techtarget.com/sDefinition/0,sid14gci213673,00.html
-
http://searchsecurity.techtarget.com/sDefinition/0,sid14gci213673,00.html
-
-
-
-
14
-
-
70449378844
-
-
http://world.std.com/franl/crypto/one-time-pad.html
-
http://world.std.com/franl/crypto/one-time-pad.html
-
-
-
-
20
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Berkeley, Calif, USA
-
Calancy T. C., Kiyavash N., Lin D. J., Secure smartcard-based fingerprint authentication Proceedings of the ACM SIGMM Multimedia Workshop on Biometrics Methods and Applications 2003 Berkeley, Calif, USA 45 52
-
(2003)
Proceedings of the ACM SIGMM Multimedia Workshop on Biometrics Methods and Applications
, pp. 45-52
-
-
Calancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
21
-
-
4043139259
-
A flexible biometrics remote user authentication scheme
-
Lin C.-H., Lai Y.-Y., A flexible biometrics remote user authentication scheme Computer Standards and Interfaces 2004 27 1 19 23
-
(2004)
Computer Standards and Interfaces
, vol.27
, Issue.1
, pp. 19-23
-
-
Lin, C.-H.1
Lai, Y.-Y.2
-
22
-
-
77951565405
-
A palmprint-based cryptosystem using double encryption
-
Biometric Technology for Human Identification V March 2008 Orlando, Fla
-
Kumar A., Kumar A., A palmprint-based cryptosystem using double encryption 6944 Biometric Technology for Human Identification V March 2008 Orlando, Fla, USA 1 9 Proceedings of SPIE
-
USA Proceedings of SPIE
, vol.6944
, pp. 1-9
-
-
Kumar, A.1
Kumar, A.2
-
23
-
-
70449378845
-
-
Rsa Algorithm http://www.di-mgt.com.au/rsaalg.html
-
RSA algorithm, http://www.di-mgt.com.au/rsaalg.html
-
-
-
-
24
-
-
70449369249
-
-
http://pajhome.org.uk/crypt/rsa/maths.html
-
http://pajhome.org.uk/crypt/rsa/maths.html
-
-
-
-
26
-
-
70449369241
-
-
http://www.wipo.int/pctdb/en/wo.jsp?wo=2001092994IA;=WO2001092994DISPLAY; =DESC
-
http://www.wipo.int/pctdb/en/wo.jsp?wo=2001092994IA;=WO2001092994DISPLAY; =DESC
-
-
-
-
28
-
-
57749207828
-
Cryptography and computer security
-
Department Of Computer Science, Yale University http://zoo.cs.yale.edu/ classes/cs467/2006f/attach/ln05.html
-
Fischer M. J., Cryptography and computer security Lecture Note-5 CPSC 467a Department Of Computer Science, Yale University. http://zoo.cs.yale.edu/ classes/cs467/2006f/attach/ln05.html
-
Lecture Note-5
, Issue.CPSC 467A
-
-
Fischer, M.J.1
-
30
-
-
70449372042
-
-
European patent no. EP1290534, December 2003
-
Immega G., Vlaar T., Vanderkooy G., Tucker K., Method for biometric encryption of email. European patent no. EP1290534, December 2003
-
Method for Biometric Encryption of Email
-
-
Immega, G.1
Vlaar, T.2
Vanderkooy, G.3
Tucker, K.4
-
31
-
-
14844327785
-
Optical security system for the protection of personal identification information
-
Doh Y.-H., Yoon J.-S., Choi K.-H., Alam M. S., Optical security system for the protection of personal identification information Applied Optics 2005 44 5 742 750
-
(2005)
Applied Optics
, vol.44
, Issue.5
, pp. 742-750
-
-
Doh, Y.-H.1
Yoon, J.-S.2
Choi, K.-H.3
Alam, M.S.4
-
32
-
-
34249314708
-
Double image encryption based on iterative fractional Fourier transform
-
Liu Z., Liu S., Double image encryption based on iterative fractional Fourier transform Optics Communications 2007 275 2 324 329
-
(2007)
Optics Communications
, vol.275
, Issue.2
, pp. 324-329
-
-
Liu, Z.1
Liu, S.2
-
33
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Goh A., Ngo D. C. L., Computation of cryptographic keys from face biometrics Communications and Multimedia Security 2003 2828 Berlin, Germany Springer 1 13 Lecture Notes in Computer Science
-
(2003)
Communications and Multimedia Security
, vol.2828
, pp. 1-13
-
-
Goh, A.1
Ngo, D.C.L.2
-
34
-
-
22844441291
-
Personal authentication using multiple palmprint representation
-
DOI 10.1016/j.patcog.2005.03.012, PII S0031320305001330
-
Kumar A., Zhang D., Personal authentication using multiple palmprint representation Pattern Recognition 2005 38 10 1695 1704 (Pubitemid 41037102)
-
(2005)
Pattern Recognition
, vol.38
, Issue.10
, pp. 1695-1704
-
-
Kumar, A.1
Zhang, D.2
-
38
-
-
33745845143
-
Personal authentication using hand images
-
DOI 10.1016/j.patrec.2006.02.021, PII S0167865506000651
-
Kumar A., Wong D. C. M., Shen H. C., Jain A. K., Personal authentication using hand images Pattern Recognition Letters 2006 27 13 1478 1486 (Pubitemid 44037106)
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.13
, pp. 1478-1486
-
-
Kumar, A.1
Wong, D.C.M.2
Shen, H.C.3
Jain, A.K.4
-
39
-
-
70449393448
-
-
http://islab.oregonstate.edu/koc/ece575/02Project/Kie+Raj
-
http://islab.oregonstate.edu/koc/ece575/02Project/Kie+Raj
-
-
-
-
40
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
Feng H., Wah C. C., Private key generation from on-line handwritten signatures Information Management and Computer Security 2002 10 4 159 164
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Feng, H.1
Wah, C.C.2
|