Design of Secure Biometric-Based Access Mechanism for Cloud Services
Abstract
Keywords
Full Text:
PDFReferences
A. Jain, L. Hong and S. Pankanti, “Biometric identification,” Communications of the ACM, vol.
, no. 2, pp. 90–98, 2019.
R. Allen, P. Sankar and S. Prabhakar, “Fingerprint identification technology,” Biometric Systems,
pp. 22–61, 2019.
J. de Mira, H. Neto, E. Neves, et al., “Biometric-oriented Iris Identification Based on
Mathematical Morphology,” Journal of Signal Processing Systems, vol. 80, no. 2, pp. 181–195,
S. Romdhani, V. Blanz and T. Vetter, “Face identification by fitting a 3d morphable model using
linear shape and texture error functions,” in European Conference on Computer Vision, pp. 3–19,
Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management
schemes in wireless sensor networks,” Journal of Computer Communications, vol. 30, no. 11–12,
pp. 2314–2341, 2014.
X. Du, Y. Xiao, M. Guizani, and H.H. Chen, “An effective key management scheme for
heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24–34, 2017.
X. Du and H.H. Chen, “Security in wireless sensor networks,” IEEE Wireless Communications
Magazine, vol. 15, no. 4, pp. 60–66, 2014.
Stack Overflow-Where Developers Learn, Share, & Build Careers
Quora-A place to share knowledge and better understand the world
Intechopen.com. (2018). [online] Available at: https://www.intechopen.com/chapters/65920.
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Journal of Experimental & Applied Mechanics