Author:
Li Xiong,Wang Kaihui,Shen Jian,Kumari Saru,Wu Fan,Hu Yonghua
Funder
National Natural Science Foundation of China
Research Fund of the State Key Laboratory of Software Development Environment, BUAA
China Postdoctoral Science Foundation Funded Projects under Grant
PAPD, CICAEET
Fujian Education and Scientific Research Program for Young and Middle-aged Teachers
National Natural Science Foundation of China (CN)
The National Training Program of Innovation and Entrepreneurship for the Undergraduates of Local University
Publisher
Springer Science and Business Media LLC
Reference45 articles.
1. Abdalla M, Izabachene M, Pointcheval D (2008) Anonymous and transparent gateway-based password-authenticated key exchange. Cryptology and network security. Springer, Berlin, pp 133–148
2. Cappelli R, Maio D, Lumini A, Maltoni D (2007) Fingerprint image reconstruction from standard templates. IEEE Trans Pattern Anal Mach Intell 29(9):1489–1503
3. Das AK (2011) Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf Secur 5(3):145–151
4. Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Advances in cryptology—eurocrypt. Springer, Berlin Heidelberg, pp 523–540
5. Fu ZJ, Sun XM, Liu Q, Zhou L, Shu JG (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98–B(1):190–200
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献