Author:
Zhang Peng,Hu Jiankun,Li Cai,Bennamoun Mohammed,Bhagavatula Vijayakumar
Subject
Law,General Computer Science
Reference11 articles.
1. An optimal algorithm for approximate nearest neighbor searching;Arya;Journal of the ACM,1998
2. A program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference;Hoang;Journal of Network and Computer Applications, Elsevier,2009
3. A pixel-based scrambling scheme for digital medical images protection;Hu;Journal of Network and Computer Applications, Elsevier,2009
4. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations,” Special Issue on Information and Communications Security, Privacy and Trust: Standards and Regulations;Hu;Computer Standards & Interfaces, Elsevier,2010
5. Hu J. Mobile fingerprint template protection: progress and open issues. In: IEEE ICIEA Conference, Singapore, 3–5 June, 2008.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献