Author:
Vitabile S.,Conti V.,Collotta M.,Scatà G.,Andolina S.,Gentile A.,Sorbello F.
Publisher
Springer Science and Business Media LLC
Reference59 articles.
1. Ambalakat P (2011) Security of biometric authentication systems. In: Proc. of 21st computer science seminar SA1-T1-1, p 2. http://www.rh.edu/~rhb/cs_seminar_2005/SessionA1/ambalakat.pdf . Accessed 11 Nov 2011
2. Bazen AM, Verwaaijen GTB, Gerez SH, Veelenturf LPJ, Van der Zwaag BJ (2000) A correlation-based fingerprint verification system. In: Proc of workshop on circuits, systems and signal processing, pp 205–213
3. Bertillon A (1885) La Couleur de l’Iris. Rev Sci 36(3):65–73
4. Bresenham J (1996) Pixel-processing fundamentals. IEEE J Comput Graph Appl 16(1):74–82. doi: 10.1109/38.481626
5. Buttazzo GC (2005) Hard real time and computing system. In: Predictable scheduling algorithms and application, 2nd edn. Springer, Berlin
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献