Funder
the Key Program of the Nature Science Foundation of Zhejiang province, China
the National Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference19 articles.
1. Cavoukian A, Stoianov A (2011) Biometric encryption. In: Van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 90–98
2. Chae CJ, Choi KN, Choi K, Kin JS, Shin YJ (2014) Enhanced biometric encryption algorithm for private key protection in BioPKI system. J Cent South Univ Technol 21(11):4286–4290
3. Dodis Y, Reyzin L. FuzzyeExtractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the international conference on advances in cryptology (EUROCRYPT’ 2004). Interlaken, pp 523–540
4. Geetika, Kaur M (2013) Multimodal based fuzzy vault using iris retina and finger vein. In: Proceedings of the fourth international conference on computing, communications and networking technologies. Tiruchengode, pp 1–5
5. Hirschbichler M, Boyd C, Boles W (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In: the Proceeding of the 2008 international conference on digital image computing: techniques and applications. Canberra, pp 540–547
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献