Author:
Guerra-Casanova J.,Sánchez-Ávila C.,Bailador G.,de Santos Sierra A.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference41 articles.
1. Bellman, R.: Dynamic Programming. Dover Publications, New York
2. Chin, Y.J., Ong, T.S., Goh, M.K., Hiew, B.Y.: Integrating palmprint and fingerprint for identity verification. In: International Conference on Network and System Security, pp. 437–442 (2009)
3. Cho, D., Park, K.R., Rhee, D.W., Kim, Y., Yang, J.: Pupil and iris localization for iris recognition in mobile phones. In: International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, and International Workshop on Self-Assembling Wireless Networks, pp. 197–201 (2006)
4. Chowhan S., Shinde G.N.: Iris biometrics recognition application in security management. Congr. Image Signal Process. 1, 661–665 (2008)
5. Clarke N.L., Furnell S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献