Author:
Hamouda Eslam,Ouda Osama,Yuan Xiaohui,Hamza Taher
Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Jaiswal, S.; Bhadauria, S.; Jadon, R.: Biometric: case study. J. Glob. Res. Comput. Sci. 2(10), 19–49 (2011)
2. Rathgeb, C.; Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011, 3 (2011)
3. Feng, C.; Yuen, C.: Vulnerabilities in binary face template. In: The IEEE Computer Society Conference on Computer Vision and Pattern Recognition (2012)
4. Chang, Y.; Zhang, W.; Chen, T.: Biometrics-based cryptographic key generation. In: The IEEE International Conference o Multimedia and Expo, pp. 2203–2206, June 2004
5. Dodis, Y.; Reyzin, L.; Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology EUROCRYPT, pp. 523–540 (2004)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献