共 19 条
[1]
[Anonymous], 2004, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
[2]
[Anonymous], 2004, PATTERN RECOGN, DOI DOI 10.1016/j.patcog.2004.04.011
[3]
[Anonymous], 1999, ICSA GUIDE CRYPTOGRA
[4]
Boyen X., 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security, P82, DOI DOI 10.1145/1030083.1030096
[5]
CHEUNG K, 2006, REVEALING SECRET FAC, P106, DOI DOI 10.1007/11608288
[7]
DENNIS JE, 1983, NUMBERICAL METHODS U, P4
[8]
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
[10]
Alignment-free cancelable fingerprint templates based on local minutiae information
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
2007, 37 (04)
:980-992