4.6 Article

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory

Christian Esposito et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

Cloud-based adaptive compression and secure management services for 3D healthcare data

Arcangelo Castiglione et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE (2015)

Article Computer Science, Artificial Intelligence

Secure biometric template generation for multi-factor authentication

Salman H. Khan et al.

PATTERN RECOGNITION (2015)

Article Computer Science, Artificial Intelligence

A new proxy re-encryption scheme for protecting critical information systems

Xu An Wang et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2015)

Article Computer Science, Theory & Methods

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Interconnecting Federated Clouds by Using Publish-Subscribe Service

Christian Esposito et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2013)

Article Computer Science, Artificial Intelligence

An effective biometric cryptosystem combining fingerprints with error correction codes

Peng Li et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Artificial Intelligence

An efficient dynamic reliability-dependent bit allocation for biometric discretization

Meng-Hui Lim et al.

PATTERN RECOGNITION (2012)

Article Computer Science, Artificial Intelligence

Service-oriented architecture based on biometric using random features and incremental neural networks

Kwontaeg Choi et al.

SOFT COMPUTING (2012)

Article Computer Science, Theory & Methods

Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme

Emile J. C. Kelkboom et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Hardware & Architecture

Enhancing Attribute-Based Encryption with Attribute Hierarchy

Jin Li et al.

MOBILE NETWORKS & APPLICATIONS (2011)

Article Computer Science, Artificial Intelligence

Biometrics in ambient intelligence

Massimo Tistarelli et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2011)

Article Computer Science, Information Systems

Hidden attribute-based signatures without anonymity revocation

Jin Li et al.

INFORMATION SCIENCES (2010)

Article Computer Science, Hardware & Architecture

An alignment-free fingerprint cryptosystem based on fuzzy vault scheme

Peng Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Computer Science, Artificial Intelligence

Privacy-preserving similarity evaluation and application to remote biometrics authentication

Hiroaki Kikuchi et al.

SOFT COMPUTING (2010)

Article Computer Science, Theory & Methods

Template-free biometric-key generation by means of fuzzy genetic clustering

Weiguo Sheng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Computer Science, Theory & Methods

Theoretical and Practical Boundaries of Binary Secure Sketches

Julien Bringer et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Computer Science, Theory & Methods

Fingerprint-based fuzzy vault: Implementation and performance

Karthik Nandakumar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2007)

Article Engineering, Electrical & Electronic

Feasibility of generating biometric encryption keys

S Hoque et al.

ELECTRONICS LETTERS (2005)