1 |
M. Blum, A. De santis, S. Micali, and G. Persiano, Noninteractive zero-knowledge,' SIAM Journal on Computing, Vol.20, No.6, pp.1084-1118, 1991
DOI
|
2 |
D. C. Feldmeier and P. R. Karn, 'UNIX password security-ten years later,' Advances in Cryptology-CRYPTO '89, LNCS 435, pp.44-63, 1990
|
3 |
S. Goldwasser, S. Micali and C. Rachoff, 'The knowledge complexity of interactive proof systems,' SIAM Journal on Computing, pp.186-208, 1989
DOI
ScienceOn
|
4 |
A. Jain, L. Hong, and R. Bolle, 'On-line fingerprint verification,' IEEE Trans. Pattern Ana. Machine Intell., Vol.19, No.4, pp.302-313, 1997
DOI
ScienceOn
|
5 |
D. V. Klein, 'Foiling the cracker : a survey of, and improvements to, password security,' Proceedings of the 2nd USENIX UNIX Security Workshop, pp.5-14, 1990
|
6 |
Z. M. Kovcs-Vajna, 'A fingerprint verification system based on triangular matching and dynamic time warping,' IEEE Trans, Pattern Ana. Machine Intell., Vol.22, No.11, pp.1266-1276, 2000
DOI
ScienceOn
|
7 |
U. Feige, A. Fiat and A. Shamir, 'Zero knowledge proofs of identity,' Journal of Cryptology, pp.77-94, 1988
DOI
|
8 |
K.-Y. Lam and T. Beth, 'Timely authentication in distributed systems,' Second European Symposium on Research in Computer Security, LNCS 648, pp.293-303, 1992
DOI
|
9 |
A. J. Wills and L. Myers, 'A cost-effective fingerprint recognition system for use with low-quality prints and damaged fingertips,' Pattern Recognition 34, pp.255-270, 2001
DOI
ScienceOn
|