Author:
Suresh K.,Pal Rajarshi,Balasundaram S. R.
Publisher
Springer International Publishing
Reference19 articles.
1. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biomteric encryption - enrollment and verification procedures. In: Proceedings of SPIE, pp. 24–35 (1998)
2. Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237–257 (2006)
3. Jin, Z., Teoh, A.B.J., Goi, B.M., Tay, Y.H.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50–62 (2016)
4. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999)
5. Sasa, A., Milosavljevic, M., Veinovic, M., Sarac, M., Jevremovic, A.: Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics. IET Biom. 6(2), 89–96 (2016)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献