共 15 条
- [1] Swaminathan A(2006)Robust and secure image hashing IEEE Trans Inf Forensics Secur 1 215-230
- [2] Mao Y(2004)On the vulnerability of biometric security systems IEEE Aerosp Electron Syst Mag 19 3-8
- [3] Wu M(2008)Biometric template security EURASIP J Adv Signal Process Spec Issue Biometr 8 1-17
- [4] Faundez-Zanuy M(2008)Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM J Comput 38 97-139
- [5] Jain AK(2009)Cryptographic hash functions. Trends and challenges J Comput Sci Control Syst 2 62-65
- [6] Nandakumar K(2009)A high-speed two-cell BCH decoder for error correcting in MLC nor flash memories IEEE Trans Circuits Syst 56 865-869
- [7] Nagar A(undefined)undefined undefined undefined undefined-undefined
- [8] Dodis Y(undefined)undefined undefined undefined undefined-undefined
- [9] Ostrovsky R(undefined)undefined undefined undefined undefined-undefined
- [10] Reyzin L(undefined)undefined undefined undefined undefined-undefined