共 26 条
[2]
[Anonymous], 2005, COMPUTER
[3]
Bicego M, 2005, LECT NOTES COMPUT SC, V3781, P15, DOI 10.1007/11569947_3
[4]
Boyen X., 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security, P82, DOI DOI 10.1145/1030083.1030096
[5]
Chang EC, 2006, LECT NOTES COMPUT SC, V4004, P59
[6]
CHOR B, 1990, LECT NOTES COMPUT SC, V435, P299
[7]
On enabling secure applications through off-line biometric identification
[J].
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1998,
:148-157
[8]
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[9]
Feng Y. Cheng, 2006, PROTECTING FACE BIOM, P29