Author:
Khan Muhammad Khurram,Zhang Jiashu
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Khan, M.K., Jiashu, Z.: Optimizing WLAN Security by Biometrics. In: Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, Boca Raton (2005) (in press)
2. Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1993)
3. Pan, S.B., et al.: An Ultra-Low Memory Fingerprint Matching Algorithm and Its Implementation on a 32-bit Smart Card. IEEE Transactions on Consumer Electronics 49(2), 453–459 (2003)
4. Schneier, B.: The uses and abuses of biometrics. Comm. ACM 42(8), 136 (1999)
5. Davida, G.I., Frankel, Y., Matt, B.J.: On Enabling Secure Applications through Online Biometric Identification. In: IEEE Symposium on Security and Privacy, pp. 148–157 (1998)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献