共 19 条
- [1] [Anonymous], 2004, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- [2] [Anonymous], 2004, PATTERN RECOGN, DOI DOI 10.1016/j.patcog.2004.04.011
- [3] [Anonymous], 1999, ICSA GUIDE CRYPTOGRA
- [4] Boyen X., 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security, P82, DOI DOI 10.1145/1030083.1030096
- [5] CHEUNG K, 2006, REVEALING SECRET FAC, P106, DOI DOI 10.1007/11608288
- [7] DENNIS JE, 1983, NUMBERICAL METHODS U, P4
- [8] Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
- [9] An analysis of BioHashing and its variants [J]. PATTERN RECOGNITION, 2006, 39 (07) : 1359 - 1368
- [10] Alignment-free cancelable fingerprint templates based on local minutiae information [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2007, 37 (04): : 980 - 992