Tài liệu tham khảo |
Loại |
Chi tiết |
1. Al-Assam, H., R. Rashid, and S. Jassim (2013). Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange, The 8 th International Conference for Internet Technology and Secured Transactions (ICITST) |
Sách, tạp chí |
Tiêu đề: |
2013). Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange |
Tác giả: |
Al-Assam, H., R. Rashid, and S. Jassim |
Năm: |
2013 |
|
5. Einar Jónsson (2007). Co-Authentication: A Probabilistic Approach to Authentication, Master Thesis, Technical University of Denmark |
Sách, tạp chí |
Tiêu đề: |
Co-Authentication: A Probabilistic Approach to Authentication |
Tác giả: |
Einar Jónsson |
Năm: |
2007 |
|
6. Failla, P., Y. Sutcu, and M. Barni et al (2010). A privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics, inProceedings of the 12th ACM workshop on Multimedia and security, ACM:Roma, Italy, p. 241-246 |
Sách, tạp chí |
Tiêu đề: |
A privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics |
Tác giả: |
Failla, P., Y. Sutcu, and M. Barni et al |
Năm: |
2010 |
|
7. Huynh, V.Q.P., et al (2013). A Combination of ANN and Secure Sketch for Generating Strong Biometric Key, Journal of Science and Technology, Vietnamese Academy of Science and Technology. 51(4B), p. 30-39 |
Sách, tạp chí |
Tiêu đề: |
A Combination of ANN and Secure Sketch for Generating Strong Biometric Key |
Tác giả: |
Huynh, V.Q.P., et al |
Năm: |
2013 |
|
8. IBM Corp (2015). IBM 4765 PCIe Cryptographic Coprocessor Custom Software Developer's Toolkit Guide, pp 9-40 |
Sách, tạp chí |
Tiêu đề: |
IBM 4765 PCIe Cryptographic Coprocessor Custom Software Developer's Toolkit Guide |
Tác giả: |
IBM Corp |
Năm: |
2015 |
|
10. Jain, A.K., K. Nandakumar, and A. Nagar (2008). Biometric template security, EURASIP J.Adv. Signal Process,p. 1-17 |
Sách, tạp chí |
Tiêu đề: |
Biometric template security |
Tác giả: |
Jain, A.K., K. Nandakumar, and A. Nagar |
Năm: |
2008 |
|
11. Le, T.T.B., et al (2014). Protecting Biometric Features by Periodic Function- Based Transformation and Fuzzy Vault, Transactions on Large-Scale Data- and KnowledgeCentered Systems XVI, A. Hameurlain, et al., Editors, Springer Berlin Heidelberg, p. 57-70 |
Sách, tạp chí |
Tiêu đề: |
Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault |
Tác giả: |
Le, T.T.B., et al |
Năm: |
2014 |
|
12. Lifang, W. and Y. Songlong (2010). A Face Based Fuzzy Vault Scheme for Secure Online Authentication , Second International Symposium on Data, Privacy and E-Commerce(ISDPE) |
Sách, tạp chí |
Tiêu đề: |
A Face Based Fuzzy Vault Scheme for Secure Online Authentication |
Tác giả: |
Lifang, W. and Y. Songlong |
Năm: |
2010 |
|
13. Matthew A.Turk and Alex P.Pentland (1991). Face Recognition Using Eigenfaces, Proc. of IEEE Conf. on Computer Vision and Pattern Recognition, pp. 586-591 |
Sách, tạp chí |
Tiêu đề: |
Face Recognition Using "Eigenfaces |
Tác giả: |
Matthew A.Turk and Alex P.Pentland |
Năm: |
1991 |
|
14. Mark Stamp (2006), Information Security: Principles and Practice, JohnWiley & Sons, Inc., Hoboken, New Jersey, ISBN-13 978-0-471-73848-0 |
Sách, tạp chí |
Tiêu đề: |
Information Security: Principles and Practice |
Tác giả: |
Mark Stamp |
Năm: |
2006 |
|
15. Nguyen, T.H.L. and T.T.H. Nguyen (2008). An approach to protect Private Key using fingerprint Biometric Encryption Key in BioPKI based security system, The 10 th International Conference on Control, Automation, Robotics and Vision, ICARCV |
Sách, tạp chí |
Tiêu đề: |
An approach to protect Private Key using fingerprint Biometric Encryption Key in BioPKI based security system |
Tác giả: |
Nguyen, T.H.L. and T.T.H. Nguyen |
Năm: |
2008 |
|
17. Xi, K., et al (2011). A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment, Security and Communication Networks, p. 487-499 |
Sách, tạp chí |
Tiêu đề: |
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment |
Tác giả: |
Xi, K., et al |
Năm: |
2011 |
|
19. Yang G, Huang T S. Human (1994). Face detection in complex background. Pattern Recognition, pp 53-63 |
Sách, tạp chí |
Tiêu đề: |
Face detection in complex background |
Tác giả: |
Yang G, Huang T S. Human |
Năm: |
1994 |
|
3. Bundesamt für Sicherheit in der Informationstechnik (2011). Study of the Privacy and Accuracy of the Fuzzy Commitment Scheme |
Khác |
|
9. IBM Corp (2015). IBM 4765 PCIe Cryptographic Coprocessor Custom Software Interface Reference |
Khác |
|
18. Nguyen Thi Hoang Lan (2009), Hệ thống an ninh thông tin dựa trên sinh trắc học Bio-PKI, Đại học Bách Khoa Hà Nội |
Khác |
|