Publisher
Springer Science and Business Media LLC
Reference38 articles.
1. Rostami M, Majzoobi M, Koushanfar F, Wallach DS, Devadas S (2014) Robust and reverse-engineering resilient puf authentication and key-exchange by substring matching. IEEE Trans Emerg Top Comput 2(1):37–49. https://doi.org/10.1109/TETC.2014.2300635
2. Jain AK, Nandakumar K, Nagar A (2013) Fingerprint template protection: From theory to practice. Security and Privacy in Biometrics, pp 187–214. https://doi.org/10.1007/978-1-4471-5230-9_8
3. Ali SS, Ganapathi II, Mahyo S, Prakash S (2019) Polynomial vault: A secure and robust fingerprint based authentication. IEEE Trans Emerg Top Comput 9(2):612–625. https://doi.org/10.1109/TETC.2019.2915288
4. Ganapathi II, Ali SS, Prakash S (2019) Multi-resolution local descriptor for 3d ear recognition. In: BIOSIG 2019-proceedings of the 18th international conference of the biometrics special interest group. Gesellschaft für Informatik eV
5. Abboud AJ, Jassim SA (2012) Biometric templates selection and update using quality measures. In: Mobile multimedia/image processing, security, and applications 2012, vol 8406, pp 74–82. https://doi.org/10.1117/12.918772. SPIE