Literatura académica sobre el tema "BIOMETRIC CRYPTOSYSTEMS"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "BIOMETRIC CRYPTOSYSTEMS".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "BIOMETRIC CRYPTOSYSTEMS"
Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček y Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks". Mathematics 9, n.º 7 (28 de marzo de 2021): 730. http://dx.doi.org/10.3390/math9070730.
Texto completoSandhya, Mulagala y Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme". International Journal of Pattern Recognition and Artificial Intelligence 31, n.º 04 (2 de febrero de 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Texto completoRiaz, Naveed, Ayesha Riaz y Sajid Ali Khan. "Biometric template security: an overview". Sensor Review 38, n.º 1 (15 de enero de 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Texto completoZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu y Peiyuan Liu. "Review on EEG-Based Authentication Technology". Computational Intelligence and Neuroscience 2021 (24 de diciembre de 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Texto completoDong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho y Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems". ACM Transactions on Multimedia Computing, Communications, and Applications 17, n.º 3 (22 de julio de 2021): 1–22. http://dx.doi.org/10.1145/3442198.
Texto completoSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee y Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application". Security and Communication Networks 2018 (2 de diciembre de 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Texto completoha. D, shob. "Biometric Cryptosystems: for User Authentication". International Journal of Innovative Research in Computer and Communication Engineering 03, n.º 05 (30 de mayo de 2015): 4322–26. http://dx.doi.org/10.15680/ijircce.2015.0305046.
Texto completoUludag, U., S. Pankanti, S. Prabhakar y A. K. Jain. "Biometric cryptosystems: issues and challenges". Proceedings of the IEEE 92, n.º 6 (junio de 2004): 948–60. http://dx.doi.org/10.1109/jproc.2004.827372.
Texto completoLiu, Hailun, Dongmei Sun, Ke Xiong y Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme". Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Texto completoChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay y and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme". Symmetry 11, n.º 2 (1 de febrero de 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Texto completoTesis sobre el tema "BIOMETRIC CRYPTOSYSTEMS"
Sarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer". Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.
Texto completoHarmer, Karl. "Evaluation of candidate fingerprint features for employment within template-free biometric cryptosystems". Thesis, University of Kent, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509621.
Texto completoASTHANA, RAJESH KUMAR. "DEVELOPMENT OF EFFICIENT METHODS FOR BIOMETRIC CRYPTOSYSTEMS". Thesis, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18919.
Texto completoBhateja, Ashok Kumar. "Biometrics based cryptosystem". Thesis, 2017. http://localhost:8080/xmlui/handle/12345678/7436.
Texto completoCapítulos de libros sobre el tema "BIOMETRIC CRYPTOSYSTEMS"
Rathgeb, Christian, Andreas Uhl y Peter Wild. "Iris Biometric Cryptosystems". En Advances in Information Security, 203–22. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_11.
Texto completoLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali y Mohamed El Haziti. "Security Analysis of Key Binding Biometric Cryptosystems". En Lecture Notes in Computer Science, 269–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31254-0_31.
Texto completoSuthaharan, Shan. "Enhanced Accuracy Moment Invariants for Biometric Recognition and Cryptosystems". En Lecture Notes in Computer Science, 439–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02611-9_44.
Texto completoLutsenko, Maria, Alexandr Kuznetsov, Anastasiia Kiian, Oleksii Smirnov y Tetiana Kuznetsova. "Biometric Cryptosystems: Overview, State-of-the-Art and Perspective Directions". En Advances in Information and Communication Technology and Systems, 66–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58359-0_5.
Texto completoKholmatov, Alisher y Berrin Yanikoglu. "Biometric Cryptosystem Using Online Signatures". En Computer and Information Sciences – ISCIS 2006, 981–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11902140_102.
Texto completoZhang, Long, Zhenan Sun, Tieniu Tan y Shungeng Hu. "Robust Biometric Key Extraction Based on Iris Cryptosystem". En Advances in Biometrics, 1060–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_107.
Texto completoHeena, Patel, Paunwala Chirag y Vora Aarohi. "Wavelet Based Feature Level Fusion Approach for Multi-biometric Cryptosystem". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 264–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73712-6_28.
Texto completoBringer, Julien, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang y Sébastien Zimmer. "An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication". En Information Security and Privacy, 96–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73458-1_8.
Texto completoBuhan, Ileana, Jeroen Breebaart, Jorge Guajardo, Koen de Groot, Emile Kelkboom y Ton Akkermans. "A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem". En Data Privacy Management and Autonomous Spontaneous Security, 78–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11207-2_7.
Texto completoShi, Jinyang y Kwok-Yan Lam. "MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem". En Advances in Information Security and Assurance, 382–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02617-1_39.
Texto completoActas de conferencias sobre el tema "BIOMETRIC CRYPTOSYSTEMS"
Lafkih, Maryam. "Cracking Biometric Authentication Cryptosystems". En 15th International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009169405140522.
Texto completoYu Zhou, Bo Zhao, Jin Han y Jun Zheng. "An effective scheme for biometric cryptosystems". En 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016. http://dx.doi.org/10.1109/compcomm.2016.7924701.
Texto completoKarimovich, Ganiyev Salim y Khudoykulov Zarif Turakulovich. "Biometric cryptosystems: Open issues and challenges". En 2016 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2016. http://dx.doi.org/10.1109/icisct.2016.7777408.
Texto completoMai, Guangcan, Meng-Hui Lim y Pong C. Yuen. "Fusing binary templates for multi-biometric cryptosystems". En 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358764.
Texto completoMcGuffey, Charles y Chen Liu. "Multi-core Approach towards Efficient Biometric Cryptosystems". En 2015 44th International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2015. http://dx.doi.org/10.1109/icppw.2015.16.
Texto completoMaiorana, Emanuele, Daria La Rocca y Patrizio Campisi. "Cognitive biometric cryptosystems a case study on EEG". En 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, 2015. http://dx.doi.org/10.1109/iwssip.2015.7314193.
Texto completoLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti y Driss Aboutajdine. "Biometric cryptosystems based Fuzzy Vault approach: Security analysis". En 2012 Second International Conference on Innovative Computing Technology (INTECH). IEEE, 2012. http://dx.doi.org/10.1109/intech.2012.6457803.
Texto completoRanjan, R. y S. K. Singh. "Improved and innovative key generation algorithms for biometric cryptosystems". En 2013 3rd IEEE International Advanced Computing Conference (IACC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iadcc.2013.6514353.
Texto completoHashem, Mithak Ibrahim y Kadhim Alibraheemi. "Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques". En 2022 International Conference on Data Science and Intelligent Computing (ICDSIC). IEEE, 2022. http://dx.doi.org/10.1109/icdsic56987.2022.10076184.
Texto completoArrahmah, Annisa Istiqomah, Yudi Satria Gondokaryono y Kyung-Hyune Rhee. "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems". En 2016 6th International Conference on System Engineering and Technology (ICSET). IEEE, 2016. http://dx.doi.org/10.1109/icsengt.2016.7849650.
Texto completo