1. Shamir A. An identity-based cryptosystems and signature schemes. Proceedings of Advances in Cryptology (CRYPTO’84), Aug 19-22, 1984, Santa Barbara, CA, USA. Berlin, Germany, Springer-Verlag, 1984: 47-53
2. Boneh D, Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology (CRYPTO’01), Aug 19-23, 2001, Santa Barbara, CA, USA. Berlin, Germany: Springer-Verlag, 2001: 213-229
3. Chen L, Malone-Lee J. Improved identity-based signcryption. Public Key Cryptography-PKC2005 (LNCS 3386), Jan 26-28, Diablerets, Switzeland. Berlin, Germany: Springer-Verlag, 2005: 362-379
4. Yuen T H, Wei V K. Fast and proven secure blind identity-based signcryption from pairings. Topics in Cryptology-CT-RSA2005 (LNCS 3376), Feb 14-18, 2005, San Fransisco, CA. USA. Berlin: Springer-Verlag, 2005, 305-322
5. Tian Y, Zhang Y J, Li Z C. A survey of identity-based cryptography using pairing. Journal of Computer Research and Development, 2006, 43(10): 1810-1819 (in Chinese)
6. Tian J, Li L, Yang X. Fingerprint-based identity authentication and digital media protection in network environment. Journal of Computer Science and Technology, 2006, 21(5): 861-870
7. Clancy T C, Kiyavash N, Lin D J. Secure smart card-based fingerprint authentication. Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Application, Nov 2-8, 2003, Berkley CA, USA. New York, NY, USA: ACM, 2003: 45-52
8. Juels A, Sudan M. A fuzzy vault scheme. Proceedings IEEE International Symposium on Information Theory, Jun 30-Jul 5, 2002, Lausanne, Switzerland. 2002: 408-409
9. Uludag U, Pankanti S, Jain A K. Fuzzy vault for fingerprints. Proceeding of International Conference on Audio- and Video- Based Biometric Person Authentication, Jul 20-22, 2003, Rye Brook, NY, USA. Berlin, Germany: Spring, 2005: 310-319
10. Hao F, Anderson R, Daugman J. Combining crypto with biometrics effectively. IEEE Transactions on Computers, 2006, 55(9): 1081-1088
11. Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceeding of Advances in Cryptology-Eurocrypt 2004 (LNCS 3027), May 2-6, 2004, Interlaken, Switzerland. Berlin, Germany: Springer-Verlag, 2004: 523-540
12. Sahai A, Waters B. Fuzzy identity-based encryption. Proceeding of Advances in Cryptology-Eurocrypt, May 22-26, 2005, Aarhus, Denmak. Berlin, Germany: Springer- Verlag, 2005: 457-473
13. Jin A T B, Ling D N C, Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 2004, 37(11): 2245-2255
14. Liu M H, Jiang X D, Kot A C. Fingerprint reference-point detection. EURASIP Journal on Applied Signal Processing, 2005, 2005(4): 498-509
|