共 15 条
[1]
Sonwanshi S.S., Ahirwal R.R., Jain Y.K., An Efficient Smart Card Based Remote User Authentication Scheme Using Hash Function, Proc. 2012 IEEE Students' Conference On Electrical, Electronics and Computer Science, SCEECS, pp. 1-4, (2012)
[2]
Sood S.K., Sarje A.K., Singh K., Smart Card Based Secure Authentication and Key Agreement Protocol, Proc. 2010 International Conference On Computer and Communication Technology, ICCCT, pp. 7-14, (2010)
[3]
Matanovic G., Mikuc M., Implementing Certificate-Based Authentication Protocol on Smart Cards, Proc. 2012 Proceedings of the 35th International Convention, MIPRO, pp. 1514-1519, (2012)
[4]
Zhao Q.F., Hsieh C.H., Card User Authentication Based on Generalized Image Morph-ing, Proc. 2011 3rd International Conference On Awareness Science and Technology, ICAST, pp. 117-122, (2011)
[5]
Thongkor K., Amornraksa T., Digital Image Watermarking for Photo Authentication in Thai National ID Card, Proc. 2012 9th International Conference On Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON, pp. 1-4, (2012)
[6]
Yahaya Y.H., Isa M., Aziz M.I., Fingerprint Biometrics Authentication on Smart Card, Proc. Second International Conference On Computer and Electrical Engineering, ICCEE, pp. 671-673, (2009)
[7]
Das A.K., Analysis and Improvement on an Efficient Biometric-Based Remote User Authentication Scheme Using Smart Cards, IET Information Security, 5, 3, pp. 145-151, (2011)
[8]
Luo X.Z., Fan J.H., Wu J.H., Single-Channel Color Image Encryption Based on the Multiple-Order Discrete Fractional Fourier Transform and Chaotic Scrambling, Proc. 2012 International Conference On Information Science and Technology, ICIST, pp. 780-784, (2012)
[9]
Bhatnagar G., Wu Q.M.J., Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission, IEEE Transactions On Instrumentation and Measurement, 61, 4, pp. 876-887, (2012)
[10]
Tao R., Meng X.Y., Wang Y., Image Encryption with Multiorders of Fractional Fourier Transforms, IEEE Transactions On Information Forensics and Security, 5, 4, pp. 734-738, (2010)