Author:
Wu Zhendong,Liang Bin,You Lin,Jian Zhihua,Li Jin
Funder
Zhejiang Province Science and Technology Innovation Program
The National Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference33 articles.
1. Atah JA, Howells G (2009) Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer, pp 170–177
2. Bodo A (1994) Method for producing a digital signature with aid of a biometric feature. German Patent DE 42(43):908
3. Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Trans Inf Forensics Secur 3(4):673–683
4. Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Futur Gener Comput Syst 43:120–134
5. Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication. Secur Priv, p 15
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献