Related references
Note: Only part of the references are listed.Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory
Christian Esposito et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Cloud-based adaptive compression and secure management services for 3D healthcare data
Arcangelo Castiglione et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE (2015)
Secure biometric template generation for multi-factor authentication
Salman H. Khan et al.
PATTERN RECOGNITION (2015)
A new proxy re-encryption scheme for protecting critical information systems
Xu An Wang et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2015)
Securely Outsourcing Attribute-Based Encryption with Checkability
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Interconnecting Federated Clouds by Using Publish-Subscribe Service
Christian Esposito et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2013)
An effective biometric cryptosystem combining fingerprints with error correction codes
Peng Li et al.
EXPERT SYSTEMS WITH APPLICATIONS (2012)
An efficient dynamic reliability-dependent bit allocation for biometric discretization
Meng-Hui Lim et al.
PATTERN RECOGNITION (2012)
Service-oriented architecture based on biometric using random features and incremental neural networks
Kwontaeg Choi et al.
SOFT COMPUTING (2012)
Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme
Emile J. C. Kelkboom et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
Enhancing Attribute-Based Encryption with Attribute Hierarchy
Jin Li et al.
MOBILE NETWORKS & APPLICATIONS (2011)
Biometrics in ambient intelligence
Massimo Tistarelli et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2011)
Hidden attribute-based signatures without anonymity revocation
Jin Li et al.
INFORMATION SCIENCES (2010)
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Peng Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)
Privacy-preserving similarity evaluation and application to remote biometrics authentication
Hiroaki Kikuchi et al.
SOFT COMPUTING (2010)
Template-free biometric-key generation by means of fuzzy genetic clustering
Weiguo Sheng et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)
Theoretical and Practical Boundaries of Binary Secure Sketches
Julien Bringer et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)
Fingerprint-based fuzzy vault: Implementation and performance
Karthik Nandakumar et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2007)
Feasibility of generating biometric encryption keys
S Hoque et al.
ELECTRONICS LETTERS (2005)