최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Central South University, v.21 no.11, 2014년, pp.4286 - 4290
Chae, Cheol-Joo , Choi, Kwang-Nam , Choi, Kiseok , Kim, Jae-Soo , Shin, YongJu
초록이 없습니다.
Journal Communications of the ACM A K Jain 47 1 34 2004 10.1145/962081.962102 JAIN A K, ROSS A. Multibiometric systems [J]. Journal Communications of the ACM, 2004, 47(1): 34-40.
M Drahanský 2005 Biometric security system fingerprint recognition technology. [D] DRAHANSKÝ M. Biometric security system fingerprint recognition technology. [D]. Brno University of Technology, Czech Republic, 2005.
EURA-SIP Journal on Information Security C Rathgeb 1 1 2011 RATHGEB C, UHL A. A survey on biometric cryptosystems and cancelable biometrics [J]. EURA-SIP Journal on Information Security, 2011, 1: 1-25.
N T H Lan 8 2009 Proceeding of ICICS 2009 (IEEE 7th International Conference on Information, Communications and Signal Processing). Macau Nguyen Thi Hoang Lan, Tran Quang Duc, Nguyen Tu Hoan. A biometrics encryption key algorithm to protect private key in BioPKI based security system [C]// Proceeding of ICICS 2009 (IEEE 7th International Conference on Information, Communications and Signal Processing). Macau, 2009: 8-10.
Y Chung 709 2007 10.1109/FBIT.2007.151 Frontiers in the Convergence of Bioscience and Information Technologies CHUNG Yunsu, MOON Kiyoung, LEE Hyung-Woo. Biometric certificate based biometric digital key generation with protection mechanism [C]// Frontiers in the Convergence of Bioscience and Information Technologies. Jeju: FBIT, 2007: 709-714.
Communications of the ACM SHAMIR 22 11 612 1979 10.1145/359168.359176 SHAMIR. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
M Ma 1 2011 2011 International Conference on Control, Automation and Systems Engineering (CASE) MA Ming, CHEN Li, WANG Jian-ming. Research on cascade algorithm of new Bio-encryption technology [C]// 2011 International Conference on Control, Automation and Systems Engineering (CASE). Singapore: IEEE, 2011, 1-4.
YOSHIFUMI UESHIGE 2005 A study on biometrics authentication in BioPKI [R] YOSHIFUMI UESHIGE. A study on biometrics authentication in BioPKI [R]. Institute of Systems & Information Technologies, KYUSHU, 2005.
N T H Lan 1595 2008 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008) Nguyen Thi Hoang Lan, Nguyen Thi Thu Hang. An approach to protect private key using fingerprint biometric encryption key in BioPKI based security system [C]// 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008). Hanoi: IEEE, 2008: 1595-1599.
W Scheirer 1 2010 10.1109/WIFS.2010.5711435 2010 IEEE International Workshop on Information Forensics and Security (WIFS) SCHEIRER W, BISHOP B, BOULT T. Beyond PKI: The Biocryptographic key infrastructure [C]// 2010 IEEE International Workshop on Information Forensics and Security (WIFS). Seattle: IEEE, 2010: 1-6.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.