Author:
Dong Likai,Ma Zhikang,Xu Tao,Wang Dong
Publisher
Springer International Publishing
Reference13 articles.
1. Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
2. Suo, H., Liu, Z., Wan, J., et al.: Security and privacy in mobile cloud computing. In: Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, pp. 655–659. IEEE (2013)
3. Darwish, A.A., et al.: Human authentication using face and fingerprint biometrics. In: 2010 Second International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), pp. 274–278. IEEE (2010)
4. Soltane, M., Doghmane, N., Guersi, N.: Face and speech based multi-modal biometric authentication. Int. J. Adv. Sci. Technol. 21(6), 41–56 (2010)
5. Zhou, H., Sadka, A.H.: Combining perceptual features with diffusion distance for face recognition. IEEE Trans. Syst. Man Cybern. Part C 41(5), 577–588 (2011)