Добірка наукової літератури з теми "BIOMETRIC CRYPTOSYSTEMS"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "BIOMETRIC CRYPTOSYSTEMS".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "BIOMETRIC CRYPTOSYSTEMS"
Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček, and Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks." Mathematics 9, no. 7 (March 28, 2021): 730. http://dx.doi.org/10.3390/math9070730.
Повний текст джерелаSandhya, Mulagala, and Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 04 (February 2, 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Повний текст джерелаRiaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Повний текст джерелаZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu, and Peiyuan Liu. "Review on EEG-Based Authentication Technology." Computational Intelligence and Neuroscience 2021 (December 24, 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Повний текст джерелаDong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, and Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 3 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3442198.
Повний текст джерелаSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, and Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application." Security and Communication Networks 2018 (December 2, 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Повний текст джерелаha. D, shob. "Biometric Cryptosystems: for User Authentication." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 05 (May 30, 2015): 4322–26. http://dx.doi.org/10.15680/ijircce.2015.0305046.
Повний текст джерелаUludag, U., S. Pankanti, S. Prabhakar, and A. K. Jain. "Biometric cryptosystems: issues and challenges." Proceedings of the IEEE 92, no. 6 (June 2004): 948–60. http://dx.doi.org/10.1109/jproc.2004.827372.
Повний текст джерелаLiu, Hailun, Dongmei Sun, Ke Xiong, and Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Повний текст джерелаChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay, and and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme." Symmetry 11, no. 2 (February 1, 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Повний текст джерелаДисертації з теми "BIOMETRIC CRYPTOSYSTEMS"
Sarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer." Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.
Повний текст джерелаHarmer, Karl. "Evaluation of candidate fingerprint features for employment within template-free biometric cryptosystems." Thesis, University of Kent, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509621.
Повний текст джерелаASTHANA, RAJESH KUMAR. "DEVELOPMENT OF EFFICIENT METHODS FOR BIOMETRIC CRYPTOSYSTEMS." Thesis, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18919.
Повний текст джерелаBhateja, Ashok Kumar. "Biometrics based cryptosystem." Thesis, 2017. http://localhost:8080/xmlui/handle/12345678/7436.
Повний текст джерелаЧастини книг з теми "BIOMETRIC CRYPTOSYSTEMS"
Rathgeb, Christian, Andreas Uhl, and Peter Wild. "Iris Biometric Cryptosystems." In Advances in Information Security, 203–22. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_11.
Повний текст джерелаLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali, and Mohamed El Haziti. "Security Analysis of Key Binding Biometric Cryptosystems." In Lecture Notes in Computer Science, 269–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31254-0_31.
Повний текст джерелаSuthaharan, Shan. "Enhanced Accuracy Moment Invariants for Biometric Recognition and Cryptosystems." In Lecture Notes in Computer Science, 439–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02611-9_44.
Повний текст джерелаLutsenko, Maria, Alexandr Kuznetsov, Anastasiia Kiian, Oleksii Smirnov, and Tetiana Kuznetsova. "Biometric Cryptosystems: Overview, State-of-the-Art and Perspective Directions." In Advances in Information and Communication Technology and Systems, 66–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58359-0_5.
Повний текст джерелаKholmatov, Alisher, and Berrin Yanikoglu. "Biometric Cryptosystem Using Online Signatures." In Computer and Information Sciences – ISCIS 2006, 981–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11902140_102.
Повний текст джерелаZhang, Long, Zhenan Sun, Tieniu Tan, and Shungeng Hu. "Robust Biometric Key Extraction Based on Iris Cryptosystem." In Advances in Biometrics, 1060–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_107.
Повний текст джерелаHeena, Patel, Paunwala Chirag, and Vora Aarohi. "Wavelet Based Feature Level Fusion Approach for Multi-biometric Cryptosystem." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 264–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73712-6_28.
Повний текст джерелаBringer, Julien, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, and Sébastien Zimmer. "An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication." In Information Security and Privacy, 96–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73458-1_8.
Повний текст джерелаBuhan, Ileana, Jeroen Breebaart, Jorge Guajardo, Koen de Groot, Emile Kelkboom, and Ton Akkermans. "A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem." In Data Privacy Management and Autonomous Spontaneous Security, 78–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11207-2_7.
Повний текст джерелаShi, Jinyang, and Kwok-Yan Lam. "MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem." In Advances in Information Security and Assurance, 382–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02617-1_39.
Повний текст джерелаТези доповідей конференцій з теми "BIOMETRIC CRYPTOSYSTEMS"
Lafkih, Maryam. "Cracking Biometric Authentication Cryptosystems." In 15th International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009169405140522.
Повний текст джерелаYu Zhou, Bo Zhao, Jin Han, and Jun Zheng. "An effective scheme for biometric cryptosystems." In 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016. http://dx.doi.org/10.1109/compcomm.2016.7924701.
Повний текст джерелаKarimovich, Ganiyev Salim, and Khudoykulov Zarif Turakulovich. "Biometric cryptosystems: Open issues and challenges." In 2016 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2016. http://dx.doi.org/10.1109/icisct.2016.7777408.
Повний текст джерелаMai, Guangcan, Meng-Hui Lim, and Pong C. Yuen. "Fusing binary templates for multi-biometric cryptosystems." In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358764.
Повний текст джерелаMcGuffey, Charles, and Chen Liu. "Multi-core Approach towards Efficient Biometric Cryptosystems." In 2015 44th International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2015. http://dx.doi.org/10.1109/icppw.2015.16.
Повний текст джерелаMaiorana, Emanuele, Daria La Rocca, and Patrizio Campisi. "Cognitive biometric cryptosystems a case study on EEG." In 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, 2015. http://dx.doi.org/10.1109/iwssip.2015.7314193.
Повний текст джерелаLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, and Driss Aboutajdine. "Biometric cryptosystems based Fuzzy Vault approach: Security analysis." In 2012 Second International Conference on Innovative Computing Technology (INTECH). IEEE, 2012. http://dx.doi.org/10.1109/intech.2012.6457803.
Повний текст джерелаRanjan, R., and S. K. Singh. "Improved and innovative key generation algorithms for biometric cryptosystems." In 2013 3rd IEEE International Advanced Computing Conference (IACC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iadcc.2013.6514353.
Повний текст джерелаHashem, Mithak Ibrahim, and Kadhim Alibraheemi. "Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques." In 2022 International Conference on Data Science and Intelligent Computing (ICDSIC). IEEE, 2022. http://dx.doi.org/10.1109/icdsic56987.2022.10076184.
Повний текст джерелаArrahmah, Annisa Istiqomah, Yudi Satria Gondokaryono, and Kyung-Hyune Rhee. "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems." In 2016 6th International Conference on System Engineering and Technology (ICSET). IEEE, 2016. http://dx.doi.org/10.1109/icsengt.2016.7849650.
Повний текст джерела