Articoli di riviste sul tema "BIOMETRIC CRYPTOSYSTEMS"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "BIOMETRIC CRYPTOSYSTEMS".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček e Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks". Mathematics 9, n. 7 (28 marzo 2021): 730. http://dx.doi.org/10.3390/math9070730.
Testo completoSandhya, Mulagala, e Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme". International Journal of Pattern Recognition and Artificial Intelligence 31, n. 04 (2 febbraio 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Testo completoRiaz, Naveed, Ayesha Riaz e Sajid Ali Khan. "Biometric template security: an overview". Sensor Review 38, n. 1 (15 gennaio 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Testo completoZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu e Peiyuan Liu. "Review on EEG-Based Authentication Technology". Computational Intelligence and Neuroscience 2021 (24 dicembre 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Testo completoDong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho e Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems". ACM Transactions on Multimedia Computing, Communications, and Applications 17, n. 3 (22 luglio 2021): 1–22. http://dx.doi.org/10.1145/3442198.
Testo completoSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee e Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application". Security and Communication Networks 2018 (2 dicembre 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Testo completoha. D, shob. "Biometric Cryptosystems: for User Authentication". International Journal of Innovative Research in Computer and Communication Engineering 03, n. 05 (30 maggio 2015): 4322–26. http://dx.doi.org/10.15680/ijircce.2015.0305046.
Testo completoUludag, U., S. Pankanti, S. Prabhakar e A. K. Jain. "Biometric cryptosystems: issues and challenges". Proceedings of the IEEE 92, n. 6 (giugno 2004): 948–60. http://dx.doi.org/10.1109/jproc.2004.827372.
Testo completoLiu, Hailun, Dongmei Sun, Ke Xiong e Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme". Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Testo completoChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay e and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme". Symmetry 11, n. 2 (1 febbraio 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Testo completoR, Sreemol, e Kavitha N. "A Review on Different Multi Biometric Cryptosystems". IJARCCE 6, n. 3 (30 marzo 2017): 1000–1001. http://dx.doi.org/10.17148/ijarcce.2017.63232.
Testo completoKumar, Amioy, M. Hanmandlu e Hari M. Gupta. "A New Scheme for the Polynomial Based Biometric Cryptosystems". ISRN Machine Vision 2014 (22 aprile 2014): 1–13. http://dx.doi.org/10.1155/2014/161932.
Testo completoAftab, Anum, Farrukh Aslam Khan, Muhammad Khurram Khan, Haider Abbas, Waseem Iqbal e Farhan Riaz. "Hand-based multibiometric systems: state-of-the-art and future challenges". PeerJ Computer Science 7 (7 ottobre 2021): e707. http://dx.doi.org/10.7717/peerj-cs.707.
Testo completoMohamed, Heba G. "BioGamal Based Authentication Scheme for Cloud Assisted IoT Based WBAN". European Journal of Electrical Engineering and Computer Science 6, n. 3 (26 maggio 2022): 11–18. http://dx.doi.org/10.24018/ejece.2022.6.3.437.
Testo completoJin, Zhe, Andrew Beng Jin Teoh, Bok-Min Goi e Yong-Haur Tay. "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation". Pattern Recognition 56 (agosto 2016): 50–62. http://dx.doi.org/10.1016/j.patcog.2016.02.024.
Testo completoMcGuffey, Charles, Chen Liu e Stephanie Schuckers. "Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security". Journal of Computing and Information Technology 23, n. 4 (2015): 329. http://dx.doi.org/10.2498/cit.1002764.
Testo completoMai, Guangcan, Meng-Hui Lim e Pong C. Yuen. "Binary feature fusion for discriminative and secure multi-biometric cryptosystems". Image and Vision Computing 58 (febbraio 2017): 254–65. http://dx.doi.org/10.1016/j.imavis.2016.11.011.
Testo completoZhou Qing, Hu Yue e Liao Xiao-Feng. "A key generation algorithm for biometric cryptosystems based on TD-ERCS". Acta Physica Sinica 58, n. 7 (2009): 4477. http://dx.doi.org/10.7498/aps.58.4477.
Testo completoJegede, et al. "Cancelable and hybrid biometric cryptosystems: current directions and open research issues". International Journal of ADVANCED AND APPLIED SCIENCES 4, n. 11 (novembre 2017): 65–77. http://dx.doi.org/10.21833/ijaas.2017.011.010.
Testo completoEsttaifan, Bashar Adel. "A Modified Vigenère Cipher based on Time and Biometrics features". Journal of Engineering 29, n. 6 (1 giugno 2023): 128–39. http://dx.doi.org/10.31026/j.eng.2023.06.10.
Testo completoSayani Chandra, Sayani Chandra. "Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network". IOSR Journal of Computer Engineering 12, n. 1 (2013): 16–22. http://dx.doi.org/10.9790/0661-1211622.
Testo completoAnna, Ilyenko, Ilyenko Sergii e Herasymenko Marharyta. "A Biometric AsymmetricCryptosystem Software Module Based on Convolutional Neural Networks". International Journal of Computer Network and Information Security 13, n. 6 (8 dicembre 2021): 1–12. http://dx.doi.org/10.5815/ijcnis.2021.06.01.
Testo completoVasilyev, Vladimir I., Pavel S. Lozhnikov, Alexey E. Sulavko, Grigory A. Fofanov e Samal S. Zhumazhanova S. "Flexible fast learning neural networks and their application for building highly reliable biometric cryptosystems based on dynamic features". IFAC-PapersOnLine 51, n. 30 (2018): 527–32. http://dx.doi.org/10.1016/j.ifacol.2018.11.272.
Testo completoBabenko, L. K., O. B. Makarevitch e E. P. Tumoian. "BIOMETRICAL CRYPTOSYSTEMS. A WAY TO SECURED BIOMETRICS". Vestnik Yuzhnogo nauchnogo tsentra 1, n. 3 (2005): 95–99. http://dx.doi.org/10.23885/1813-4289-2005-1-3-95-99.
Testo completoAziz, Nur Adibah Saffa. "Mutual Authentication in Body Area Networks (BANs) Using Multi-Biometric and Physiological Signal-Based Key Agreement". Journal of IT in Asia 9, n. 1 (30 novembre 2021): 108–20. http://dx.doi.org/10.33736/jita.3847.2021.
Testo completoLiu, Xiaolong, Wei-Bin Lee, Quy-Anh Bui, Chia-Chen Lin e Hsiao-Ling Wu. "Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication". Sustainability 10, n. 10 (9 ottobre 2018): 3588. http://dx.doi.org/10.3390/su10103588.
Testo completoDamaševičius, Robertas, Rytis Maskeliūnas, Egidijus Kazanavičius e Marcin Woźniak. "Combining Cryptography with EEG Biometrics". Computational Intelligence and Neuroscience 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/1867548.
Testo completoLadhiya, Karan. "Privacy Preserving Bio-Metric Authentication". International Journal for Research in Applied Science and Engineering Technology 10, n. 3 (31 marzo 2022): 114–24. http://dx.doi.org/10.22214/ijraset.2022.40570.
Testo completoLozhnikov, Pavel, e Samal Zhumazhanova. "Model of the "biometry-code" converter based on artificial neural networks for analysis of facial thermograms". Digital Technology Security, n. 2 (25 giugno 2021): 154–65. http://dx.doi.org/10.17212/2782-2230-2021-2-154-165.
Testo completoChauhan, Alka. "A Development of Fingerprint Based Biometric Cryptosystem". International Journal for Research in Applied Science and Engineering Technology 10, n. 6 (30 giugno 2022): 4653–75. http://dx.doi.org/10.22214/ijraset.2022.44945.
Testo completoQin, Ying, e Bob Zhang. "Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal". Applied Sciences 13, n. 14 (12 luglio 2023): 8117. http://dx.doi.org/10.3390/app13148117.
Testo completoJiang, Xing Chen, e Jian De Zheng. "An Indirect Fingerprint Authentication Scheme in Cloud Computing". Applied Mechanics and Materials 484-485 (gennaio 2014): 986–90. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.986.
Testo completoLai, Yen-Lung, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho e Andrew Beng Jin Teoh. "Symmetric keyring encryption scheme for biometric cryptosystem". Information Sciences 502 (ottobre 2019): 492–509. http://dx.doi.org/10.1016/j.ins.2019.05.064.
Testo completoBelousova, A. A., V. I. Nobeleva e N. N. Tokareva. "On codes used in biometrical cryptosystems". Prikladnaya diskretnaya matematika. Prilozhenie, n. 11 (1 settembre 2018): 105–6. http://dx.doi.org/10.17223/2226308x/11/32.
Testo completoChakole, Ashish Vijayanand. "Performance Evaluation of Biometric Cryptosystem Using Fuzzy Vault". International Journal for Research in Applied Science and Engineering Technology V, n. IV (26 aprile 2017): 734–38. http://dx.doi.org/10.22214/ijraset.2017.4133.
Testo completo., J. Lenin, B. Sundaravadivazhagan e M. Sulthan Ibrahim. "Blending Biometric To Generate Symmetric Key for Cryptosystem". International Journal of Computer Sciences and Engineering 7, n. 4 (30 aprile 2019): 220–24. http://dx.doi.org/10.26438/ijcse/v7i4.220224.
Testo completoLu, Li, e Jialiang Peng. "Finger Multi-biometric Cryptosystem using Feature-Level Fusion". International Journal of Signal Processing, Image Processing and Pattern Recognition 7, n. 3 (30 giugno 2014): 223–36. http://dx.doi.org/10.14257/ijsip.2014.7.3.18.
Testo completoImamverdiyev, Yadigar, Andrew Beng Jin Teoh e Jaihie Kim. "Biometric cryptosystem based on discretized fingerprint texture descriptors". Expert Systems with Applications 40, n. 5 (aprile 2013): 1888–901. http://dx.doi.org/10.1016/j.eswa.2012.10.009.
Testo completoKuznetsov, А. А., R. V. Serhiienko e A. A. Uvarova. "Code based fuzzy extractor for biometric cryptography". Radiotekhnika, n. 195 (28 dicembre 2018): 224–34. http://dx.doi.org/10.30837/rt.2018.4.195.23.
Testo completoItakura, Yukio, e Shigeo Tsujii. "Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures". International Journal of Information Security 4, n. 4 (8 marzo 2005): 288–96. http://dx.doi.org/10.1007/s10207-004-0065-5.
Testo completoAlarcon-Aquino, Vicente, JuanManuel Ramirez-Cortes, Oleg Starostenko, HectorAugusto Garcia-Baleon e Pilar Gomez-Gil. "Biometric Cryptosystem based on Keystroke Dynamics and K-medoids". IETE Journal of Research 57, n. 4 (2011): 385. http://dx.doi.org/10.4103/0377-2063.86341.
Testo completoA. Abou Elazm, Lamiaa, Walid El-Shafai, Sameh Ibrahim, Mohamed G. Egila, H. Shawkey, Mohamed K. H. Elsaid, Naglaa F. Soliman, Hussah Nasser AlEisa e Fathi E. Abd El-Samie. "Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem". Intelligent Automation & Soft Computing 36, n. 1 (2023): 929–55. http://dx.doi.org/10.32604/iasc.2023.031386.
Testo completoKannan, S., e V. Seenivasagam. "Structure and Performance Analysis of Multi Stage Biometric Cryptosystem". Research Journal of Information Technology 6, n. 1 (1 febbraio 2015): 1–7. http://dx.doi.org/10.19026/rjit.6.1636.
Testo completoRajan, R. Ashoka, e P. Kumaran. "Multi-biometric cryptosystem using graph for secure cloud authentication". Journal of Intelligent & Fuzzy Systems 38, n. 5 (29 maggio 2020): 6437–44. http://dx.doi.org/10.3233/jifs-179724.
Testo completoNagar, Abhishek, Karthik Nandakumar e Anil K. Jain. "A hybrid biometric cryptosystem for securing fingerprint minutiae templates". Pattern Recognition Letters 31, n. 8 (giugno 2010): 733–41. http://dx.doi.org/10.1016/j.patrec.2009.07.003.
Testo completoMaiorana, Emanuele. "Biometric cryptosystem using function based on-line signature recognition". Expert Systems with Applications 37, n. 4 (aprile 2010): 3454–61. http://dx.doi.org/10.1016/j.eswa.2009.10.043.
Testo completoAli, Rifaqat, e Arup Kumar Pal. "A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem". International Journal of Business Data Communications and Networking 13, n. 1 (gennaio 2017): 74–84. http://dx.doi.org/10.4018/ijbdcn.2017010107.
Testo completoLalithamani, N., e M. Sabrigiriraj. "Technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem". Machine Graphics and Vision 23, n. 1/2 (14 gennaio 2012): 97–114. http://dx.doi.org/10.22630/mgv.2014.23.1.6.
Testo completoPrasanalakshmi, B., A. Kannammal, B. Gomathi, K. Deepa e R. Sridevi. "Biometric Cryptosystem Involving Two Traits And Palm Vein As Key". Procedia Engineering 30 (2012): 303–10. http://dx.doi.org/10.1016/j.proeng.2012.01.865.
Testo completoChanukya, Padira S. V. V. N., e T. K. Thivakaran. "Multimodal biometric cryptosystem for human authentication using fingerprint and ear". Multimedia Tools and Applications 79, n. 1-2 (7 settembre 2019): 659–73. http://dx.doi.org/10.1007/s11042-019-08123-w.
Testo completo