ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Biometric cryptographic key generation based on city block distance
2009 Workshop on Applications of Computer Vision (WACV)
◽
10.1109/wacv.2009.5403105
◽
2009
◽
Author(s):
Xiangqian Wu
◽
Peipei Wang
◽
Kuanquan Wang
◽
Yong Xu
Keyword(s):
Key Generation
◽
City Block
◽
Cryptographic Key Generation
◽
Cryptographic Key
◽
City Block Distance
Download Full-text
Related Documents
Cited By
References
Biometrics-based cryptographic key generation
2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763)
◽
10.1109/icme.2004.1394707
◽
2005
◽
Cited By ~ 23
Author(s):
Yao-Jen Chang
◽
Wende Zhang
◽
Tsuhan Chen
Keyword(s):
Key Generation
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
Cryptographic Key Generation Using Burning Ship Fractal
Proceedings of the 2nd International Conference on Vision, Image and Signal Processing - ICVISP 2018
◽
10.1145/3271553.3271577
◽
2018
◽
Cited By ~ 1
Author(s):
Shafali Agarwal
Keyword(s):
Key Generation
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
Cryptographic Key Generation by Genetic Algorithms
Information & Security An International Journal
◽
10.11610/isij.4305
◽
2019
◽
Vol 43
(1)
◽
pp. 54-61
Author(s):
Michal Turčaník
◽
Martin Javurek
Keyword(s):
Genetic Algorithms
◽
Key Generation
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics
2009 International Conference on Advances in Recent Technologies in Communication and Computing
◽
10.1109/artcom.2009.193
◽
2009
◽
Cited By ~ 6
Author(s):
N. Lalithamani
◽
K.P. Soman
Keyword(s):
Key Generation
◽
Efficient Approach
◽
Cryptographic Key Generation
◽
Fingerprint Biometrics
◽
Cryptographic Key
Download Full-text
A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition
Proceedings of the International Conference on Data Engineering and Communication Technology - Advances in Intelligent Systems and Computing
◽
10.1007/978-981-10-1678-3_18
◽
2016
◽
pp. 189-196
Author(s):
Londhe Swapnali
◽
Jagtap Megha
◽
Shinde Ranjeet
◽
P. P. Belsare
◽
Gavali B. Ashwini
Keyword(s):
Key Generation
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
A Low Power Diffused Bit Generator as a TRNG for Cryptographic Key Generation
10.1109/discover52564.2021.9663619
◽
2021
◽
Author(s):
D. Aneesh Bharadwaj
◽
P Anirvinnan
◽
B S Premanada
Keyword(s):
Low Power
◽
Key Generation
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation
IEEE Access
◽
10.1109/access.2017.2766523
◽
2018
◽
Vol 6
◽
pp. 428-442
◽
Cited By ~ 8
Author(s):
Sanaz Rahimi Moosavi
◽
Ethiopia Nigussie
◽
Marco Levorato
◽
Seppo Virtanen
◽
Jouni Isoaho
Keyword(s):
Low Latency
◽
Key Generation
◽
Cryptographic Key Generation
◽
Feature Based
◽
Cryptographic Key
Download Full-text
K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-642-10268-4_10
◽
2009
◽
pp. 85-94
◽
Cited By ~ 2
Author(s):
H. A. Garcia-Baleon
◽
V. Alarcon-Aquino
◽
O. Starostenko
Keyword(s):
Key Generation
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
A new dynamic cryptographic key generation scheme for a hierarchy
Proceedings of TENCON'94 - 1994 IEEE Region 10's 9th Annual International Conference on: 'Frontiers of Computer Technology'
◽
10.1109/tencon.1994.369257
◽
2002
◽
Author(s):
Min-Shiang Hwang
◽
Wei-Pang Yang
Keyword(s):
Key Generation
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
Performance metrics and empirical results of a PUF cryptographic key generation ASIC
2012 IEEE International Symposium on Hardware-Oriented Security and Trust
◽
10.1109/hst.2012.6224329
◽
2012
◽
Cited By ~ 25
Author(s):
Meng-Day Yu
◽
Richard Sowell
◽
Alok Singh
◽
David M'Raihi
◽
Srinivas Devadas
Keyword(s):
Performance Metrics
◽
Key Generation
◽
Empirical Results
◽
Cryptographic Key Generation
◽
Cryptographic Key
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close