1. Combining crypto with biometrics effectively;Hao;IEEE Transactions on Computers,2006
2. Computation of cryptographic keys from face biometrics. Communications and multimedia security;Goh;Advanced Techniques for Network and Data,2003
3. Cryptographic key generation from voice;Monrose,2001
4. ID-based signature scheme without trusted pkg;Liao;Information Security and Cryptology,2005
5. Deep learning in neural networks: An overview;Schmidhuber;Neural Networks,2015