Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference50 articles.
1. An authentication flaw in browser-based single sign-on protocols: impact and remediations;Armando;Comput. Secur.,2013
2. Key generation in a voice based template free biometric security system;Atah,2009
3. A secure cloud computing based framework for big data information management of smart grid;Baek;IEEE Trans. Cloud Comput.,2015
4. Theoretical and practical boundaries of binary secure sketches;Bringer;IEEE Trans. Inf. Forensics Secur.,2008
5. A finger vein recognition algorithm using feature block fusion and depth neural network;Chen,2015
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献