4.5 Article

Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

An improved and provably secure three-factor user authentication scheme for wireless sensor networks

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Blackhole attack: user identity and password seize attack using honeypot

Hyung-Jin Mun et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2016)

Editorial Material Computer Science, Information Systems

Distributed hybrid P2P networking systems

Jungsoo Han

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Computer Science, Information Systems

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Qi Jiang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Computer Science, Artificial Intelligence

A writer identification system for on-line whiteboard data

Andreas Schlapbach et al.

PATTERN RECOGNITION (2008)

Article Computer Science, Artificial Intelligence

A writer identification and verification system

A Bensefia et al.

PATTERN RECOGNITION LETTERS (2005)

Article Computer Science, Artificial Intelligence

Automatic writer identification using connected-component contours and edge-based features of uppercase western script

L Schomaker et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2004)

Article Computer Science, Artificial Intelligence

Personal identification based on handwriting

HES Said et al.

PATTERN RECOGNITION (2000)