1 |
Haizhou Li, Kar-Ann Toh, Liyuan Li, Advanced Topics in Biometrics, World Scientific, 2011.
|
2 |
J. Tepandi, I. Tsahhirov and S. Vassiljev, "Wireless PKI Security and Mobile Voting," IEEE Computer, vol. 43, no. 6, pp. 54-60, June, 2010.
|
3 |
C. Vivaracho-Pascual, J. Pascual-Gaspar, "On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.
|
4 |
Want, "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, Vol. 9, No. 3, pp. 6-9, 2010.
|
5 |
N. Ratha, J. Connell, R. Bolle, "Enhancing security and privacy in biometric-based authentication systems," IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001.
DOI
ScienceOn
|
6 |
D. Evans and N. Paul, "Election Security: Perception and reality," IEEE Security & Privacy, vol. 2, no. 1, pp. 24-31, Jan. 2004.
DOI
ScienceOn
|
7 |
ITU-T X.1088, A Framework for biometric digital key generation, ITU-T, 2008.
|
8 |
T. Elgamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, IT-31(4), pp. 469-472, 1985.
|
9 |
P. Janbandhu and M. Siyal, "Novel biometric digital signatures for Internet-based applications," Information Management & Computer Security, Vol. 9, No. 5, pp. 205-212, 2001.
DOI
ScienceOn
|
10 |
P. Orvos, "Towards biometric digital signatures," Networkshop, Eszterhazy College, Eger, pp. 26-28, 2002.
|