Author:
Nguyen Dang,Tran Dat,Sharma Dharmendra,Ma Wanli
Reference33 articles.
1. Barker, E. Nist special publication 800-57 part 1 revision 4 recommendation for key management-part 1: General 2016;.
2. Feldmeier, D.C., Karn, P.R. Unix password security-ten years later. In: Advances in CryptologyCRYPTO89 Proceedings. Springer; 1989, p. 44-63.
3. Soutar, C., Tomko, G. Secure private key generation using a fingerprint. In: Cardtech/Securetech Conference Proceedings; vol. 1. 1996, p. 245-252.
4. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 2004; 92 (6): 948-960.
5. Computation of cryptographic keys from face biometrics;Goh,2003
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献