共 23 条
- [1] [Anonymous], 2008, Proceedings of the 17th Conference on USENIX Security Symposium
- [2] [Anonymous], 2008, IACR CRYPTOLOGY EPRI
- [3] Chen B., 2007, DIGITAL IMAGE COMPUT
- [4] Clancy T.C., P 2003 ACM SIGMM WOR, P45
- [5] Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048
- [6] enka J. Sed., 2014, PRIVACY PRESERVING P
- [7] The use of multiple measurements in taxonomic problems [J]. ANNALS OF EUGENICS, 1936, 7 : 179 - 188
- [8] Cryptographic key generation using handwritten signature [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION III, 2006, 6202
- [9] Han SG, 2008, LECT NOTES ARTIF INT, V5012, P136
- [10] Private key generation from on-line handwritten signatures [J]. Information Management and Computer Security, 2002, 10 (04): : 159 - 164