-
1
-
-
84872061531
-
Gartner: Mobile to outpace desktop web by 2013
-
M. Walsh, "Gartner: Mobile to outpace desktop web by 2013," Online Media Daily, 2010.
-
(2010)
Online Media Daily
-
-
Walsh, M.1
-
3
-
-
70350537372
-
From augmented reality to augmented computing: A look at cloud-mobile convergence
-
X. Luo, "From augmented reality to augmented computing: A look at cloud-mobile convergence," in Proceedings of the International Symposium on Ubiquitous Virtual Reality (ISUVR'09), Gwangju, South Korea. IEEE, 2009, pp. 29-32.
-
(2009)
Proceedings of the International Symposium on Ubiquitous Virtual Reality (ISUVR'09), Gwangju, South Korea. IEEE
, pp. 29-32
-
-
Luo, X.1
-
4
-
-
77955002808
-
Calling the cloud: Enabling mobile phones as interfaces to cloud applications
-
New York, NY, USA, ACM
-
I. Giurgiu, O. Riva, D. Juric, I. Krivulev, and G. Alonso, "Calling the cloud: Enabling mobile phones as interfaces to cloud applications," in Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware (Middleware'09). New York, NY, USA, ACM, 2009, pp. 1-20.
-
(2009)
Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware (Middleware'09)
, pp. 1-20
-
-
Giurgiu, I.1
Riva, O.2
Juric, D.3
Krivulev, I.4
Alonso, G.5
-
6
-
-
33744779400
-
Biometrics: A tool for information security
-
A. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for information security," IEEE Transaction on Information Forensics Security. 2006, vol. 1, No. 2, pp. 125-143.
-
(2006)
IEEE Transaction on Information Forensics Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.1
Ross, A.2
Pankanti, S.3
-
7
-
-
80052249505
-
Biometric encryption: Technology for strong authentication, security and privacy
-
Rsm Erasmus University, Rotterdam, the Netherlands, October 11-12, Springer
-
A. Cavoukian, A. Stoianov, and F. Carter, "Biometric Encryption: Technology for Strong Authentication, Security and Privacy," in Proceedings of Polices and Research in Identity Management (IDMAN'07). Rsm Erasmus University, Rotterdam, the Netherlands, October 11-12, 2007, Springer, pp. 57-77.
-
(2007)
Proceedings of Polices and Research in Identity Management (IDMAN'07)
, pp. 57-77
-
-
Cavoukian, A.1
Stoianov, A.2
Carter, F.3
-
9
-
-
54049105192
-
-
U.S. Patent 5541994, July 30 (Priority date: Sept.7, 1994)
-
G. Tomko, C. Soutar, and G. Schmidt, Fingerprint controlled public key cryptographic system. U.S. Patent 5541994, July 30, 1996 (Priority date: Sept.7, 1994).
-
(1996)
Fingerprint Controlled Public Key Cryptographic System
-
-
Tomko, G.1
Soutar, C.2
Schmidt, G.3
-
10
-
-
78650402528
-
Cell phone-based biometric identification
-
J. Kwapisz, G. Weiss, and S. Moore, "Cell phone-based biometric identification," in Proceedings of 2010 Fourth IEEE International Conference on. Biometrics: Theory Applications and Systems (BTAS'10). IEEE, 2010, pp. 1-7.
-
(2010)
Proceedings of 2010 Fourth IEEE International Conference On. Biometrics: Theory Applications and Systems (BTAS'10). IEEE
, pp. 1-7
-
-
Kwapisz, J.1
Weiss, G.2
Moore, S.3
-
11
-
-
26444554928
-
Vulnerabilities in biometric encryption systems
-
Tarrytown, NY, USA
-
A. Adler, "Vulnerabilities in biometric encryption systems," Audio-and Video-Based Biometric Person Authentication. Tarrytown, NY, USA, 2005, pp. 1100-1109.
-
(2005)
Audio-and Video-Based Biometric Person Authentication
, pp. 1100-1109
-
-
Adler, A.1
-
12
-
-
34247366845
-
Finding the original point set hidden among chaff
-
E. Chang, R. Shen, and F. Teo, "Finding the original point set hidden among chaff," in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. ACM, 2006, pp. 182-188.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. ACM
, pp. 182-188
-
-
Chang, E.1
Shen, R.2
Teo, F.3
-
13
-
-
34748913281
-
-
Technical Report. University of Twente
-
I. Buhan, J. Doumen, P. Hartel, and R. Veldhuis, "Fuzzy extractors for continuous distributions," Technical Report. University of Twente, 2006.
-
(2006)
Fuzzy Extractors for Continuous Distributions
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
14
-
-
43949116287
-
Biometric template security
-
January
-
J. Anil K, N. Karthik and N. Abhishek, "Biometric template security," Journal on Advances in Signal Processing, Special Issue on Biometrics. January, 2008, pp.1-7.
-
(2008)
Journal on Advances in Signal Processing, Special Issue on Biometrics
, pp. 1-7
-
-
Anil, K.J.1
Karthik, N.2
Abhishek, N.3
-
15
-
-
45449114377
-
An authentication protocol with encrypted biometric data
-
Berlin, Heidelberg: Springer-Verlag
-
J. Bringer and H. Chabanne, "An authentication protocol with encrypted biometric data," in Proceedings of the Progress in Cryptology, AFRICACRYPT, Lecture Notes in Computer Science. vol. 5023, Berlin, Heidelberg: Springer-Verlag, 2008, pp. 109-124
-
(2008)
Proceedings of the Progress in Cryptology, AFRICACRYPT, Lecture Notes in Computer Science. Vol. 5023
, pp. 109-124
-
-
Bringer, J.1
Chabanne, H.2
|