Author:
Connie Tee,Teoh Andrew,Goh Michael,Ngo David
Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference9 articles.
1. Inside risks: the uses and abuses of biometrics;Scheier;Comm. ACM,1999
2. Enhancing security and privacy in biometrics-based authentication systems;Ratha;IBM Syst. J.,2001
3. On enabling secure applications through off-line biometric identification;Davida,1998
4. A fuzzy vault scheme;Juels,2002
5. High confidence visual recognition of persons by a test of statistical independence;Daugman;IEEE Trans. Pattern Anal. Mach. Intell.,1993
Cited by
110 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献