Author:
Thakurdesai Abhijeet,Nistor Marian Sorin,Bein Doina,Pickl Stefan,Bein Wolfgang
Publisher
Springer International Publishing
Reference14 articles.
1. A. Othman, J. Callahan, The Horcrux protocol: A method for decentralized biometric-based self-sovereign identity, in 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, 2018, pp. 1–7. https://doi.org/10.1109/IJCNN.2018.8489316
2. M. Hume, Identity theft cited as threat after equifax security breach. Globe Mail Toronto A 7 (2004)
3. A. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004). https://doi.org/10.1109/TCSVT.2003.818349
4. A. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Signal Proc., 2008(113), 1–17 (2008). https://doi.org/10.1155/2008/579416
5. J. Hughes, E. Maler, Security assertion markup language (SAML) v2. 0 technical overview. OASIS SSTC Working Draft. sstc-saml-techoverview-2.0-draft-08, 29–38 (2005)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献