共 24 条
[1]
Ang R, 2005, LECT NOTES COMPUT SC, V3574, P242
[4]
On enabling secure applications through off-line biometric identification
[J].
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1998,
:148-157
[5]
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[7]
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
[8]
A fuzzy vault scheme
[J].
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS,
2002,
:408-408
[9]
Face recognition with renewable and privacy preserving binary templates
[J].
FOURTH IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS,
2005,
:21-26