Artículos de revistas sobre el tema "BIOMETRIC CRYPTOSYSTEMS"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "BIOMETRIC CRYPTOSYSTEMS".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček y Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks". Mathematics 9, n.º 7 (28 de marzo de 2021): 730. http://dx.doi.org/10.3390/math9070730.
Texto completoSandhya, Mulagala y Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme". International Journal of Pattern Recognition and Artificial Intelligence 31, n.º 04 (2 de febrero de 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Texto completoRiaz, Naveed, Ayesha Riaz y Sajid Ali Khan. "Biometric template security: an overview". Sensor Review 38, n.º 1 (15 de enero de 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Texto completoZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu y Peiyuan Liu. "Review on EEG-Based Authentication Technology". Computational Intelligence and Neuroscience 2021 (24 de diciembre de 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Texto completoDong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho y Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems". ACM Transactions on Multimedia Computing, Communications, and Applications 17, n.º 3 (22 de julio de 2021): 1–22. http://dx.doi.org/10.1145/3442198.
Texto completoSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee y Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application". Security and Communication Networks 2018 (2 de diciembre de 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Texto completoha. D, shob. "Biometric Cryptosystems: for User Authentication". International Journal of Innovative Research in Computer and Communication Engineering 03, n.º 05 (30 de mayo de 2015): 4322–26. http://dx.doi.org/10.15680/ijircce.2015.0305046.
Texto completoUludag, U., S. Pankanti, S. Prabhakar y A. K. Jain. "Biometric cryptosystems: issues and challenges". Proceedings of the IEEE 92, n.º 6 (junio de 2004): 948–60. http://dx.doi.org/10.1109/jproc.2004.827372.
Texto completoLiu, Hailun, Dongmei Sun, Ke Xiong y Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme". Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Texto completoChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay y and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme". Symmetry 11, n.º 2 (1 de febrero de 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Texto completoR, Sreemol y Kavitha N. "A Review on Different Multi Biometric Cryptosystems". IJARCCE 6, n.º 3 (30 de marzo de 2017): 1000–1001. http://dx.doi.org/10.17148/ijarcce.2017.63232.
Texto completoKumar, Amioy, M. Hanmandlu y Hari M. Gupta. "A New Scheme for the Polynomial Based Biometric Cryptosystems". ISRN Machine Vision 2014 (22 de abril de 2014): 1–13. http://dx.doi.org/10.1155/2014/161932.
Texto completoAftab, Anum, Farrukh Aslam Khan, Muhammad Khurram Khan, Haider Abbas, Waseem Iqbal y Farhan Riaz. "Hand-based multibiometric systems: state-of-the-art and future challenges". PeerJ Computer Science 7 (7 de octubre de 2021): e707. http://dx.doi.org/10.7717/peerj-cs.707.
Texto completoMohamed, Heba G. "BioGamal Based Authentication Scheme for Cloud Assisted IoT Based WBAN". European Journal of Electrical Engineering and Computer Science 6, n.º 3 (26 de mayo de 2022): 11–18. http://dx.doi.org/10.24018/ejece.2022.6.3.437.
Texto completoJin, Zhe, Andrew Beng Jin Teoh, Bok-Min Goi y Yong-Haur Tay. "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation". Pattern Recognition 56 (agosto de 2016): 50–62. http://dx.doi.org/10.1016/j.patcog.2016.02.024.
Texto completoMcGuffey, Charles, Chen Liu y Stephanie Schuckers. "Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security". Journal of Computing and Information Technology 23, n.º 4 (2015): 329. http://dx.doi.org/10.2498/cit.1002764.
Texto completoMai, Guangcan, Meng-Hui Lim y Pong C. Yuen. "Binary feature fusion for discriminative and secure multi-biometric cryptosystems". Image and Vision Computing 58 (febrero de 2017): 254–65. http://dx.doi.org/10.1016/j.imavis.2016.11.011.
Texto completoZhou Qing, Hu Yue y Liao Xiao-Feng. "A key generation algorithm for biometric cryptosystems based on TD-ERCS". Acta Physica Sinica 58, n.º 7 (2009): 4477. http://dx.doi.org/10.7498/aps.58.4477.
Texto completoJegede, et al. "Cancelable and hybrid biometric cryptosystems: current directions and open research issues". International Journal of ADVANCED AND APPLIED SCIENCES 4, n.º 11 (noviembre de 2017): 65–77. http://dx.doi.org/10.21833/ijaas.2017.011.010.
Texto completoEsttaifan, Bashar Adel. "A Modified Vigenère Cipher based on Time and Biometrics features". Journal of Engineering 29, n.º 6 (1 de junio de 2023): 128–39. http://dx.doi.org/10.31026/j.eng.2023.06.10.
Texto completoSayani Chandra, Sayani Chandra. "Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network". IOSR Journal of Computer Engineering 12, n.º 1 (2013): 16–22. http://dx.doi.org/10.9790/0661-1211622.
Texto completoAnna, Ilyenko, Ilyenko Sergii y Herasymenko Marharyta. "A Biometric AsymmetricCryptosystem Software Module Based on Convolutional Neural Networks". International Journal of Computer Network and Information Security 13, n.º 6 (8 de diciembre de 2021): 1–12. http://dx.doi.org/10.5815/ijcnis.2021.06.01.
Texto completoVasilyev, Vladimir I., Pavel S. Lozhnikov, Alexey E. Sulavko, Grigory A. Fofanov y Samal S. Zhumazhanova S. "Flexible fast learning neural networks and their application for building highly reliable biometric cryptosystems based on dynamic features". IFAC-PapersOnLine 51, n.º 30 (2018): 527–32. http://dx.doi.org/10.1016/j.ifacol.2018.11.272.
Texto completoBabenko, L. K., O. B. Makarevitch y E. P. Tumoian. "BIOMETRICAL CRYPTOSYSTEMS. A WAY TO SECURED BIOMETRICS". Vestnik Yuzhnogo nauchnogo tsentra 1, n.º 3 (2005): 95–99. http://dx.doi.org/10.23885/1813-4289-2005-1-3-95-99.
Texto completoAziz, Nur Adibah Saffa. "Mutual Authentication in Body Area Networks (BANs) Using Multi-Biometric and Physiological Signal-Based Key Agreement". Journal of IT in Asia 9, n.º 1 (30 de noviembre de 2021): 108–20. http://dx.doi.org/10.33736/jita.3847.2021.
Texto completoLiu, Xiaolong, Wei-Bin Lee, Quy-Anh Bui, Chia-Chen Lin y Hsiao-Ling Wu. "Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication". Sustainability 10, n.º 10 (9 de octubre de 2018): 3588. http://dx.doi.org/10.3390/su10103588.
Texto completoDamaševičius, Robertas, Rytis Maskeliūnas, Egidijus Kazanavičius y Marcin Woźniak. "Combining Cryptography with EEG Biometrics". Computational Intelligence and Neuroscience 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/1867548.
Texto completoLadhiya, Karan. "Privacy Preserving Bio-Metric Authentication". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de marzo de 2022): 114–24. http://dx.doi.org/10.22214/ijraset.2022.40570.
Texto completoLozhnikov, Pavel y Samal Zhumazhanova. "Model of the "biometry-code" converter based on artificial neural networks for analysis of facial thermograms". Digital Technology Security, n.º 2 (25 de junio de 2021): 154–65. http://dx.doi.org/10.17212/2782-2230-2021-2-154-165.
Texto completoChauhan, Alka. "A Development of Fingerprint Based Biometric Cryptosystem". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junio de 2022): 4653–75. http://dx.doi.org/10.22214/ijraset.2022.44945.
Texto completoQin, Ying y Bob Zhang. "Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal". Applied Sciences 13, n.º 14 (12 de julio de 2023): 8117. http://dx.doi.org/10.3390/app13148117.
Texto completoJiang, Xing Chen y Jian De Zheng. "An Indirect Fingerprint Authentication Scheme in Cloud Computing". Applied Mechanics and Materials 484-485 (enero de 2014): 986–90. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.986.
Texto completoLai, Yen-Lung, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho y Andrew Beng Jin Teoh. "Symmetric keyring encryption scheme for biometric cryptosystem". Information Sciences 502 (octubre de 2019): 492–509. http://dx.doi.org/10.1016/j.ins.2019.05.064.
Texto completoBelousova, A. A., V. I. Nobeleva y N. N. Tokareva. "On codes used in biometrical cryptosystems". Prikladnaya diskretnaya matematika. Prilozhenie, n.º 11 (1 de septiembre de 2018): 105–6. http://dx.doi.org/10.17223/2226308x/11/32.
Texto completoChakole, Ashish Vijayanand. "Performance Evaluation of Biometric Cryptosystem Using Fuzzy Vault". International Journal for Research in Applied Science and Engineering Technology V, n.º IV (26 de abril de 2017): 734–38. http://dx.doi.org/10.22214/ijraset.2017.4133.
Texto completo., J. Lenin, B. Sundaravadivazhagan y M. Sulthan Ibrahim. "Blending Biometric To Generate Symmetric Key for Cryptosystem". International Journal of Computer Sciences and Engineering 7, n.º 4 (30 de abril de 2019): 220–24. http://dx.doi.org/10.26438/ijcse/v7i4.220224.
Texto completoLu, Li y Jialiang Peng. "Finger Multi-biometric Cryptosystem using Feature-Level Fusion". International Journal of Signal Processing, Image Processing and Pattern Recognition 7, n.º 3 (30 de junio de 2014): 223–36. http://dx.doi.org/10.14257/ijsip.2014.7.3.18.
Texto completoImamverdiyev, Yadigar, Andrew Beng Jin Teoh y Jaihie Kim. "Biometric cryptosystem based on discretized fingerprint texture descriptors". Expert Systems with Applications 40, n.º 5 (abril de 2013): 1888–901. http://dx.doi.org/10.1016/j.eswa.2012.10.009.
Texto completoKuznetsov, А. А., R. V. Serhiienko y A. A. Uvarova. "Code based fuzzy extractor for biometric cryptography". Radiotekhnika, n.º 195 (28 de diciembre de 2018): 224–34. http://dx.doi.org/10.30837/rt.2018.4.195.23.
Texto completoItakura, Yukio y Shigeo Tsujii. "Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures". International Journal of Information Security 4, n.º 4 (8 de marzo de 2005): 288–96. http://dx.doi.org/10.1007/s10207-004-0065-5.
Texto completoAlarcon-Aquino, Vicente, JuanManuel Ramirez-Cortes, Oleg Starostenko, HectorAugusto Garcia-Baleon y Pilar Gomez-Gil. "Biometric Cryptosystem based on Keystroke Dynamics and K-medoids". IETE Journal of Research 57, n.º 4 (2011): 385. http://dx.doi.org/10.4103/0377-2063.86341.
Texto completoA. Abou Elazm, Lamiaa, Walid El-Shafai, Sameh Ibrahim, Mohamed G. Egila, H. Shawkey, Mohamed K. H. Elsaid, Naglaa F. Soliman, Hussah Nasser AlEisa y Fathi E. Abd El-Samie. "Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem". Intelligent Automation & Soft Computing 36, n.º 1 (2023): 929–55. http://dx.doi.org/10.32604/iasc.2023.031386.
Texto completoKannan, S. y V. Seenivasagam. "Structure and Performance Analysis of Multi Stage Biometric Cryptosystem". Research Journal of Information Technology 6, n.º 1 (1 de febrero de 2015): 1–7. http://dx.doi.org/10.19026/rjit.6.1636.
Texto completoRajan, R. Ashoka y P. Kumaran. "Multi-biometric cryptosystem using graph for secure cloud authentication". Journal of Intelligent & Fuzzy Systems 38, n.º 5 (29 de mayo de 2020): 6437–44. http://dx.doi.org/10.3233/jifs-179724.
Texto completoNagar, Abhishek, Karthik Nandakumar y Anil K. Jain. "A hybrid biometric cryptosystem for securing fingerprint minutiae templates". Pattern Recognition Letters 31, n.º 8 (junio de 2010): 733–41. http://dx.doi.org/10.1016/j.patrec.2009.07.003.
Texto completoMaiorana, Emanuele. "Biometric cryptosystem using function based on-line signature recognition". Expert Systems with Applications 37, n.º 4 (abril de 2010): 3454–61. http://dx.doi.org/10.1016/j.eswa.2009.10.043.
Texto completoAli, Rifaqat y Arup Kumar Pal. "A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem". International Journal of Business Data Communications and Networking 13, n.º 1 (enero de 2017): 74–84. http://dx.doi.org/10.4018/ijbdcn.2017010107.
Texto completoLalithamani, N. y M. Sabrigiriraj. "Technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem". Machine Graphics and Vision 23, n.º 1/2 (14 de enero de 2012): 97–114. http://dx.doi.org/10.22630/mgv.2014.23.1.6.
Texto completoPrasanalakshmi, B., A. Kannammal, B. Gomathi, K. Deepa y R. Sridevi. "Biometric Cryptosystem Involving Two Traits And Palm Vein As Key". Procedia Engineering 30 (2012): 303–10. http://dx.doi.org/10.1016/j.proeng.2012.01.865.
Texto completoChanukya, Padira S. V. V. N. y T. K. Thivakaran. "Multimodal biometric cryptosystem for human authentication using fingerprint and ear". Multimedia Tools and Applications 79, n.º 1-2 (7 de septiembre de 2019): 659–73. http://dx.doi.org/10.1007/s11042-019-08123-w.
Texto completo