1 |
J. B. Lacy, D. P. Mitchell, and W. M. Schell, "Cryptolib: Cryptography in software," In USENIX Security Symposium IV Proceedings, USENIX Association, pp.1-17, 1993.
|
2 |
M. R. Verma., A.K. Maynrklay, and B coatterjcee, "Edge ceteoction in fingerprints." Pattern Recogmitiom.20.p513, 1987
DOI
ScienceOn
|
3 |
D. M. Weher "A cost effective fingerprint verification algorithm for commercial application." Proceedings of the south African Syraposuno on Commendation and Signal Processing, p.9, 1992.
|
4 |
D. Mario and D. Maltoni, "Direct Gray-Scale Minutie Detection In Fingerprints," IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 19, no.1, pp.27-40, 1997.
DOI
ScienceOn
|
5 |
A. Shacur, "Or the generation of cryptographically strong pseudorandom sequences" ACM Transactions on Computer Science, pp 38-44, 1983.
|
6 |
NIST special prosecution 800-12. A statistical test suite for random and pseudorandom number generators for cryptographic applications. 2000
|
7 |
L. Blum, M. Blum, and M. shub, "A simple unpredictable pseudo random generator," SIAM Journal on Computing, 15, pp.364-383, 1986.
DOI
ScienceOn
|
8 |
S. Micali and C. P. Schnorr, "Efficient perfect polynomial random number generators," Journal of Cryptology, 3, pp.157-172, 1991.
|
9 |
L. Hong, Y. Wan and A. K. Jain, "Fingerprint enhancement: algorithm and performance evaluation," IEEE Trans. Pattern Anal. Mach. Intell. 20, p777, 1998.
DOI
ScienceOn
|
10 |
FIPS 186, "Digital signature standard," Federal Information Processing Standards 186, U.S. Department of Commerce/NIST, National Technical Information Service, Springfield, 1994.
|
11 |
G.. B. Agnew, "Ransom sources for cryptographic systems, "Eurocrypt '87, Springer-Verlag, LNCS v.304, pp.77-81, 1988.
|
12 |
D. Davis, R. Ihaka, and P. Fenstermacher, "Cryptographic randomness from air turbulence in disk drives," Crypto '94, Springer-Verlag, LNCS v.839, pp.114-120, 1994.
|
13 |
RSA data Security, "Inc-RSA secure PC for windows 55 Users Manual." 1997
|
14 |
M. Jakobsson, E. Shriver, B. K. Hillyer, and A. Juels, "A practical secure Random bit generator," ACM Conference on Computer and Communications Security, pp.103-111, 1998.
|
15 |
J. Hastad, "Pseudo random number generators under uniform assumptions," In Proceeding of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.395-404, 1990.
|
16 |
M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, New Jersey, 1996.
|