1 |
A. Kholmatov and B.A. Yanikoglu, "Biometric Authentication using Online Signatures," In Proceedings of ISCIS, pp.373-380, 2004.
|
2 |
S. Krawczyk and A.K. Jain, "Securing Electronic Medical Records Using Biometric Authentication," In Proceedings of AVBPA, pp.1110-1119, 2005.
|
3 |
A. Kholmatov and B. Yanikoglu, "Identity authentication using improved online signature verification method," Pattern Recognition Letters, Vol.26, Issue 15, pp.2400-2408, 2005.
DOI
ScienceOn
|
4 |
Chao LI, Yi-xian YANG and Xin-xin NIU, "Biometric-based personal identity-authentication system and security analysis," The Journal of China Universities of Posts and Telecommunications, Vol.13, Issue 4, pp.43-47, 2006.
DOI
ScienceOn
|
5 |
A. Bhargav-Spantzel, A.C. Squicciarini and E. Bertino, "Privacy Preserving Multi-Factor Authentication with Biometrics," In Proceedings of Digital Identity Management, pp.63-72, 2006.
|
6 |
R. Agrawal and C. Johnson, "Securing electronic health records without impeding the flow of information," International Journal of Medical Informatics, Vol.76, Issues 5-6, pp.471-479, 2007.
DOI
ScienceOn
|
7 |
A. Salaiwarakul and M. Ryan, "Analysis of a Biometric Authentication Protocol for Signature Creation Application," In Proceedings of IWSEC, pp.231-245, 2008.
|
8 |
Despina Polemi, "TTPs and biometrics for securing the payment of telemedical services." Future Generation Computer Systems, Vol.15, Issue 2, pp.265-276, 1999.
DOI
ScienceOn
|
9 |
D.H. Yum and P.J. Lee, "Identity-Based Cryptography in Public Key Management," In Proceedings of EuroPKI, pp.71-84, 2004
|
10 |
Michael Fritscher, "Towards A Unique World-wide Digital Certificate," Proceedings of the Fifth Americas Conference on Information Systems, 1999.
|