Funder
AGH University of Science and Technology research Grant
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference29 articles.
1. Aboalsamh HA (2011) A multi biometric system using combined vein and fingerprint identification. Int J Circuits Syst Signal Process 5(1):9–36
2. Castiglione A, D’Alessio B, De Santis A (2011) Steganography and secure communication on online social networks and online photo sharing. In: 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), pp 363–368.
https://doi.org/10.1109/BWCCA.2011.60
3. Castiglione A, De Santis A, Fiore U, Palmieri F (2012) An asynchronous covert channel using spam. Comput Math Appl 63(2):437–447.
https://doi.org/10.1016/j.camwa.2011.07.068
4. Cherry D (2014) Chapter 2—usernames and passwords for websites. In: Cherry D (ed) The basics of digital privacy. Syngress, Boston, pp 19–31.
https://doi.org/10.1016/B978-0-12-800011-3.00002-3
5. Clancy TC, Kiyavash N, Lin D (2003) Secure smartcard-based fingerprint authentication. In: Proceedings of the ACMSIGMM 2003 multimedia, biometrics methods and applications workshop, pp 45–52
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献