-
1
-
-
79955021325
-
-
Data on PDAs mostly unprotected. Network World Fusion. Available from
-
Shaw K. Data on PDAs mostly unprotected. Network World Fusion. Available from 2004.
-
(2004)
-
-
Shaw, K.1
-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
4
-
-
79955045522
-
-
Use of elliptic curves in cryptography, CRYPTO 85
-
Miller V. Use of elliptic curves in cryptography, CRYPTO 85, 1985.
-
(1985)
-
-
Miller, V.1
-
6
-
-
19444368925
-
Biometric encryption - enrollment and verification procedures
-
Soutar C, Roberge D, Stojanov SA, Gilroy R, Vijaya Kumar BVK. Biometric encryption - enrollment and verification procedures. Proceedings of SPIE, Optical Pattern Recognition IX 1998; 3386: 24-35.
-
(1998)
Proceedings of SPIE, Optical Pattern Recognition IX
, vol.3386
, pp. 24-35
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
7
-
-
0032224440
-
Biometric encryption using image processing
-
Soutar C, Roberge D, Stojanov SA, Gilroy R, Vijaya Kumar BVK. Biometric encryption using image processing. Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques II, 1998; 3314: 178-188.
-
(1998)
Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
8
-
-
8344236959
-
Biometric encryption.
-
In Nichols RK (ed.). McGraw Hill, New York
-
Soutar C, Roberge D, Stojanov SA, Gilroy R, Vijaya Kumar BVK. Biometric encryption. In ICSA Guide to Cryptography Nichols RK (ed.). McGraw Hill, New York, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
9
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
Teoh A, Goh A, Ngo D. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence 2006; 28(12): 1892-1901.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Goh, A.2
Ngo, D.3
-
10
-
-
10044284550
-
-
Cancellable Biometric Filters forFace Recognition. Proceedings of IEEE International Conference Pattern Recognition, Cambridge, UK, August
-
Savvides M, Vijayakumar B. Cancellable Biometric Filters forFace Recognition. Proceedings of IEEE International Conference Pattern Recognition, volume 3, pages 922-925, Cambridge, UK, August 2004.
-
(2004)
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Vijayakumar, B.2
-
11
-
-
33947530278
-
Generating Cancelable Fingerprint Templates
-
Ratha N, Chikkerur S, Connell J, Bolle R. Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 2007; 29(4): 561-572.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.3
Bolle, R.4
-
12
-
-
37849020774
-
-
2N Discretisation of BioPhasor in Cancellable Biometrics, Proceedings of Second International Conference on Biometrics, Seoul, South Korea
-
Teoh A, Toh K, Yip W. 2N Discretisation of BioPhasor in Cancellable Biometrics, Proceedings of Second International Conference on Biometrics, Seoul, South Korea, 2007; 435-444.
-
(2007)
, pp. 435-444
-
-
Teoh, A.1
Toh, K.2
Yip, W.3
-
13
-
-
52149117439
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal of Computing 2008; 38(1): 97-139.
-
(2008)
SIAM Journal of Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
16
-
-
70449508376
-
-
Biometric mobile template protection: a composite feature based fingerprint fuzzy vault, IEEE International Conference on Communications, Dresden, Germany
-
Xi K, Hu J. Biometric mobile template protection: a composite feature based fingerprint fuzzy vault, IEEE International Conference on Communications, Dresden, Germany, 2009.
-
(2009)
-
-
Xi, K.1
Hu, J.2
-
17
-
-
84947613118
-
-
-
-
-
18
-
-
84947617288
-
-
-
-
-
19
-
-
84947611913
-
-
-
-
-
20
-
-
84947617629
-
-
-
-
-
21
-
-
33947528272
-
A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing
-
Wang Y, Hu J, Phillips D. A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Transactions on PAMI 2007; 29(4): 573-585.
-
(2007)
IEEE Transactions on PAMI
, vol.29
, Issue.4
, pp. 573-585
-
-
Wang, Y.1
Hu, J.2
Phillips, D.3
-
22
-
-
79955045851
-
-
FIPS. 180-2: Secure Hash Standard (SHS) 25 February
-
FIPS. 180-2: Secure Hash Standard (SHS) 25 February 2004.
-
(2004)
-
-
-
23
-
-
79955035588
-
-
Watson. NIST special database 24, live-scan digital video fingerprint database. Technical report, U.S. National Institute of Standards and Technology
-
Watson. NIST special database 24, live-scan digital video fingerprint database. Technical report, U.S. National Institute of Standards and Technology, 1998.
-
(1998)
-
-
-
24
-
-
33751580079
-
-
FV C2002: Second Fingerprint Verification Competition, ICPR, 16th International Conference on Pattern Recognition (ICPR'02) Volume 3
-
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK. 'FV C2002: Second Fingerprint Verification Competition, ' ICPR, vol. 3, pp. 30811, 16th International Conference on Pattern Recognition (ICPR'02) Volume 3, 2002.
-
(2002)
, vol.3
, pp. 30811
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
25
-
-
36348986198
-
-
Fingerprint-based Fuzzy Vault: Implementation and Performance, IEEE Transactions on on Informatics Forensics and Security, 744-757, December
-
Nandakumar K, Jain AK, Pankanti S. Fingerprint-based Fuzzy Vault: Implementation and Performance, IEEE Transactions on on Informatics Forensics and Security, vol. 2, no. 4, pp. 744-757, December 2007.
-
(2007)
, vol.2
, Issue.4
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
26
-
-
79954992266
-
-
Sun Website, URL:
-
Sun Website, URL: 2009.
-
(2009)
-
-
-
27
-
-
79955033278
-
-
Bouncy Castle. Lightweight API, The Legion of the Bouncy Castle
-
Bouncy Castle. Lightweight API, The Legion of the Bouncy Castle, 2008.
-
(2008)
-
-
-
28
-
-
79955044886
-
-
Certicom. SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Corp.
-
Certicom. SEC 2: Recommended Elliptic Curve Domain Parameters, Certicom Corp., 2000.
-
(2000)
-
-
-
29
-
-
72849117130
-
-
Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography, International Workshop on Intelligent Decision Support Systems and Applications in Networked and Distributed Systems, IEEE 3rd International Conference on Network & System Security (NSS09), Gold Coast, Australia, October
-
Ahmad T, Hu J, Han S. Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography, International Workshop on Intelligent Decision Support Systems and Applications in Networked and Distributed Systems, IEEE 3rd International Conference on Network & System Security (NSS09), Gold Coast, Australia, October 2009; 19-21.
-
(2009)
, pp. 19-21
-
-
Ahmad, T.1
Hu, J.2
Han, S.3
-
30
-
-
33744948730
-
-
A novel hybrid crypto-biometric authentication scheme for ATM based banking applications, IAPR International Conference on Biometrics (ICB2006), Hong Kong China, 5-7 January, 2006. Published at Lecture Notes in Computer Science, Springer
-
Han F, Hu J, Yu X, Feng Y, Zhou J. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications, IAPR International Conference on Biometrics (ICB2006), Hong Kong China, 5-7 January, 2006. Published at Lecture Notes in Computer Science, Springer, vol. 3832/2005, 2005; 675-681.
-
(2005)
, vol.3832
, Issue.2005
, pp. 675-681
-
-
Han, F.1
Hu, J.2
Yu, X.3
Feng, Y.4
Zhou, J.5
-
31
-
-
79955011596
-
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
-
Mahmood A, Hu J, Tari Z, Leckie C. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. Journal of Network and Computer Applications, 2010.
-
(2010)
Journal of Network and Computer Applications
-
-
Mahmood, A.1
Hu, J.2
Tari, Z.3
Leckie, C.4
-
33
-
-
77955333989
-
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations
-
Hu J, Chen HH, Hou TW. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations. Computer Standards & Interfaces, 274-280.
-
Computer Standards & Interfaces
, pp. 274-280
-
-
Hu, J.1
Chen, H.H.2
Hou, T.W.3
-
34
-
-
68949196337
-
A Program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
Hoang X.D, Hu J, Bertok P. A Program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. Journal of Network and Computer Applications, Elsevier, 2009; 32: 1219-1228.
-
(2009)
Journal of Network and Computer Applications, Elsevier
, vol.32
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
35
-
-
67349221790
-
A pixel-based scrambling scheme for digital medical images protection
-
Hu J, Han F. A pixel-based scrambling scheme for digital medical images protection. Journal of Network and Computer Applications, 2009; 32: 788-794.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, pp. 788-794
-
-
Hu, J.1
Han, F.2
-
36
-
-
65249107163
-
A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection
-
Hu J, Qiu D, Chen HH, Yu X. A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection. IEEE Network, 2009; 23(1): 42-47.
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Qiu, D.2
Chen, H.H.3
Yu, X.4
-
38
-
-
33847297478
-
Enhanced gradient-based algorithm for the estimation of fingerprint orientation field
-
Wang Y, Hu J, Han F. Enhanced gradient-based algorithm for the estimation of fingerprint orientation field. Applied Mathematics and Computation, 2007; 185(2): 823-833.
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.2
, pp. 823-833
-
-
Wang, Y.1
Hu, J.2
Han, F.3
-
39
-
-
33847305360
-
Fingerprint images encryption via multi-scroll chaotic attractors
-
Han F, Hu J, Yu X, Wang Y. Fingerprint images encryption via multi-scroll chaotic attractors. Applied Mathematics and Computation, 2007; 185: 931-939.
-
(2007)
Applied Mathematics and Computation
, vol.185
, pp. 931-939
-
-
Han, F.1
Hu, J.2
Yu, X.3
Wang, Y.4
-
40
-
-
64749114044
-
On multi-scroll chaotic attractors in hysteresis-based piecewise linear systems
-
Han F, Yu X, Feng Y, Hu J. On multi-scroll chaotic attractors in hysteresis-based piecewise linear systems. IEEE Transactions on Circuits and Systems-II, 2007; 54(11): 1004-1008.
-
(2007)
IEEE Transactions on Circuits and Systems-II
, vol.54
, Issue.11
, pp. 1004-1008
-
-
Han, F.1
Yu, X.2
Feng, Y.3
Hu, J.4
|