Letteratura scientifica selezionata sul tema "BIOMETRIC CRYPTOSYSTEMS"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "BIOMETRIC CRYPTOSYSTEMS".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "BIOMETRIC CRYPTOSYSTEMS"
Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček e Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks". Mathematics 9, n. 7 (28 marzo 2021): 730. http://dx.doi.org/10.3390/math9070730.
Testo completoSandhya, Mulagala, e Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme". International Journal of Pattern Recognition and Artificial Intelligence 31, n. 04 (2 febbraio 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Testo completoRiaz, Naveed, Ayesha Riaz e Sajid Ali Khan. "Biometric template security: an overview". Sensor Review 38, n. 1 (15 gennaio 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Testo completoZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu e Peiyuan Liu. "Review on EEG-Based Authentication Technology". Computational Intelligence and Neuroscience 2021 (24 dicembre 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Testo completoDong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho e Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems". ACM Transactions on Multimedia Computing, Communications, and Applications 17, n. 3 (22 luglio 2021): 1–22. http://dx.doi.org/10.1145/3442198.
Testo completoSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee e Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application". Security and Communication Networks 2018 (2 dicembre 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Testo completoha. D, shob. "Biometric Cryptosystems: for User Authentication". International Journal of Innovative Research in Computer and Communication Engineering 03, n. 05 (30 maggio 2015): 4322–26. http://dx.doi.org/10.15680/ijircce.2015.0305046.
Testo completoUludag, U., S. Pankanti, S. Prabhakar e A. K. Jain. "Biometric cryptosystems: issues and challenges". Proceedings of the IEEE 92, n. 6 (giugno 2004): 948–60. http://dx.doi.org/10.1109/jproc.2004.827372.
Testo completoLiu, Hailun, Dongmei Sun, Ke Xiong e Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme". Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Testo completoChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay e and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme". Symmetry 11, n. 2 (1 febbraio 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Testo completoTesi sul tema "BIOMETRIC CRYPTOSYSTEMS"
Sarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer". Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.
Testo completoHarmer, Karl. "Evaluation of candidate fingerprint features for employment within template-free biometric cryptosystems". Thesis, University of Kent, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509621.
Testo completoASTHANA, RAJESH KUMAR. "DEVELOPMENT OF EFFICIENT METHODS FOR BIOMETRIC CRYPTOSYSTEMS". Thesis, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18919.
Testo completoBhateja, Ashok Kumar. "Biometrics based cryptosystem". Thesis, 2017. http://localhost:8080/xmlui/handle/12345678/7436.
Testo completoCapitoli di libri sul tema "BIOMETRIC CRYPTOSYSTEMS"
Rathgeb, Christian, Andreas Uhl e Peter Wild. "Iris Biometric Cryptosystems". In Advances in Information Security, 203–22. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_11.
Testo completoLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali e Mohamed El Haziti. "Security Analysis of Key Binding Biometric Cryptosystems". In Lecture Notes in Computer Science, 269–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31254-0_31.
Testo completoSuthaharan, Shan. "Enhanced Accuracy Moment Invariants for Biometric Recognition and Cryptosystems". In Lecture Notes in Computer Science, 439–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02611-9_44.
Testo completoLutsenko, Maria, Alexandr Kuznetsov, Anastasiia Kiian, Oleksii Smirnov e Tetiana Kuznetsova. "Biometric Cryptosystems: Overview, State-of-the-Art and Perspective Directions". In Advances in Information and Communication Technology and Systems, 66–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58359-0_5.
Testo completoKholmatov, Alisher, e Berrin Yanikoglu. "Biometric Cryptosystem Using Online Signatures". In Computer and Information Sciences – ISCIS 2006, 981–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11902140_102.
Testo completoZhang, Long, Zhenan Sun, Tieniu Tan e Shungeng Hu. "Robust Biometric Key Extraction Based on Iris Cryptosystem". In Advances in Biometrics, 1060–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_107.
Testo completoHeena, Patel, Paunwala Chirag e Vora Aarohi. "Wavelet Based Feature Level Fusion Approach for Multi-biometric Cryptosystem". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 264–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73712-6_28.
Testo completoBringer, Julien, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang e Sébastien Zimmer. "An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication". In Information Security and Privacy, 96–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73458-1_8.
Testo completoBuhan, Ileana, Jeroen Breebaart, Jorge Guajardo, Koen de Groot, Emile Kelkboom e Ton Akkermans. "A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem". In Data Privacy Management and Autonomous Spontaneous Security, 78–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11207-2_7.
Testo completoShi, Jinyang, e Kwok-Yan Lam. "MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem". In Advances in Information Security and Assurance, 382–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02617-1_39.
Testo completoAtti di convegni sul tema "BIOMETRIC CRYPTOSYSTEMS"
Lafkih, Maryam. "Cracking Biometric Authentication Cryptosystems". In 15th International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009169405140522.
Testo completoYu Zhou, Bo Zhao, Jin Han e Jun Zheng. "An effective scheme for biometric cryptosystems". In 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016. http://dx.doi.org/10.1109/compcomm.2016.7924701.
Testo completoKarimovich, Ganiyev Salim, e Khudoykulov Zarif Turakulovich. "Biometric cryptosystems: Open issues and challenges". In 2016 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2016. http://dx.doi.org/10.1109/icisct.2016.7777408.
Testo completoMai, Guangcan, Meng-Hui Lim e Pong C. Yuen. "Fusing binary templates for multi-biometric cryptosystems". In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358764.
Testo completoMcGuffey, Charles, e Chen Liu. "Multi-core Approach towards Efficient Biometric Cryptosystems". In 2015 44th International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2015. http://dx.doi.org/10.1109/icppw.2015.16.
Testo completoMaiorana, Emanuele, Daria La Rocca e Patrizio Campisi. "Cognitive biometric cryptosystems a case study on EEG". In 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, 2015. http://dx.doi.org/10.1109/iwssip.2015.7314193.
Testo completoLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti e Driss Aboutajdine. "Biometric cryptosystems based Fuzzy Vault approach: Security analysis". In 2012 Second International Conference on Innovative Computing Technology (INTECH). IEEE, 2012. http://dx.doi.org/10.1109/intech.2012.6457803.
Testo completoRanjan, R., e S. K. Singh. "Improved and innovative key generation algorithms for biometric cryptosystems". In 2013 3rd IEEE International Advanced Computing Conference (IACC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iadcc.2013.6514353.
Testo completoHashem, Mithak Ibrahim, e Kadhim Alibraheemi. "Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques". In 2022 International Conference on Data Science and Intelligent Computing (ICDSIC). IEEE, 2022. http://dx.doi.org/10.1109/icdsic56987.2022.10076184.
Testo completoArrahmah, Annisa Istiqomah, Yudi Satria Gondokaryono e Kyung-Hyune Rhee. "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems". In 2016 6th International Conference on System Engineering and Technology (ICSET). IEEE, 2016. http://dx.doi.org/10.1109/icsengt.2016.7849650.
Testo completo