메뉴 건너뛰기




Volumn , Issue , 2013, Pages 28-33

Feasibility of deploying biometric encryption in mobile cloud computing

Author keywords

Biometric Encryption; Mobile Cloud Computing; Security

Indexed keywords

ADVANCED PROTOCOLS; BIOMETRIC AUTHENTICATION; BIOMETRIC ENCRYPTION; BIOMETRIC IDENTIFICATIONS; CLOUD COMPUTING ENVIRONMENTS; CLOUD COMPUTING SERVICES; RESEARCH SUBJECTS; SECURITY;

EID: 84889019163     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ChinaGrid.2013.10     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 84872061531 scopus 로고    scopus 로고
    • Gartner: Mobile to outpace desktop web by 2013
    • M. Walsh, "Gartner: Mobile to outpace desktop web by 2013," Online Media Daily, 2010.
    • (2010) Online Media Daily
    • Walsh, M.1
  • 7
    • 80052249505 scopus 로고    scopus 로고
    • Biometric encryption: Technology for strong authentication, security and privacy
    • Rsm Erasmus University, Rotterdam, the Netherlands, October 11-12, Springer
    • A. Cavoukian, A. Stoianov, and F. Carter, "Biometric Encryption: Technology for Strong Authentication, Security and Privacy," in Proceedings of Polices and Research in Identity Management (IDMAN'07). Rsm Erasmus University, Rotterdam, the Netherlands, October 11-12, 2007, Springer, pp. 57-77.
    • (2007) Proceedings of Polices and Research in Identity Management (IDMAN'07) , pp. 57-77
    • Cavoukian, A.1    Stoianov, A.2    Carter, F.3
  • 11
    • 26444554928 scopus 로고    scopus 로고
    • Vulnerabilities in biometric encryption systems
    • Tarrytown, NY, USA
    • A. Adler, "Vulnerabilities in biometric encryption systems," Audio-and Video-Based Biometric Person Authentication. Tarrytown, NY, USA, 2005, pp. 1100-1109.
    • (2005) Audio-and Video-Based Biometric Person Authentication , pp. 1100-1109
    • Adler, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.