共 11 条
[1]
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[2]
*BIOP, BIOP AUTH SOFTW HOM
[3]
Fingerprint matching using transformation parameter clustering
[J].
IEEE COMPUTATIONAL SCIENCE & ENGINEERING,
1997, 4 (04)
:42-49
[4]
Gollman, 2013, COMPUTER SECURITY
[5]
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[7]
Lau Edmond, 2004, Enhanced user authentication through keystroke biometrics, V6
[8]
Monrose F, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P73, DOI 10.1145/319709.319720
[9]
POLEMI D, BIOMETRIC TECHNIQUES
[10]
SENTOSA A, 2007, THESIS RMIT U