JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 17-23.doi: 10.6040/j.issn.1671-9352.2.2014.146
Previous Articles Next Articles
L Yang, ZHANG Gong-xuan, YANG Wen, WANG Tian-shu
CLC Number:
[1] 林文峰,杨帆,陈国民.基于指纹的数字信息加密算法[J].计算机工程,2010, 36(8):132-134. LIN Wenfeng, YANG Fan, CHEN Guomin. Digital information encryption algorithm based on fingerprint[J]. Computer Engineering, 2010, 36(8): 132-134. [2] JUELS A, SUDAN M. A fuzzy vault scheme [C]//Proceedings of the 2002 International Symposium on Information Theory. Piscataway: IEEE, 2002:408-426. [3] 游林,杨玲.基于指纹改进的模糊金库算法[J].杭州电子科技大学学报,2012, 32(5):49-52. YOU Lin, YANG Ling. Modified fuzzy vault scheme based on fingerprints [J]. Journal of Hangzhou Dianzi University, 2012, 32(5): 49-52. [4] HIEP D V, TRAN Q D, NGUYEN THI H L. A multibiometric encryption key algorithm using fuzzy vault to protect private key in BioPKI based security system[C]// Proceedings of 2010 IEEE RIVF International Conference on Computing and Communication Technologies, Research, Innovation, and Vision for the Future (RIVF). Piscataway: IEEE, 2010:1-6. [5] 滕旭.基于二维码的证件管理研究与应用[D].西安:西安科技大学,2011. TENG Xu. Research and application of identification management based on two dimensional barcode[D]. Xi'an: Xi'an University of Science and Technology, 2011. [6] 刘艳涛,游林.一种改进的随机性模糊金库算法[J].科技通报,2011, 27(2):288-292. LIU Yantao, YOU Lin. An improved randomness fuzzy vault scheme[J]. Bulletin of Science and Technology, 2011, 27(2): 288-292. |
[1] | ZHAO Jun-sheng1,2, WANG Xiu-li1,2, GAO Ming-wei1,2, WANG Jia-bao1,2, WANG Yong-cui1,2, CHEN Ying1,2, JIANG Hui1,2, YANG Jing1,2, WANG Liu-mi. Construction and application of SSR fingerprints of hybrid #br# cotton variety Lu 05H9 with red-corolla marker trait [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(1): 44-49. |
[2] | GUO Wen-juan, YANG Gong-ping*, DONG Jin-li. A review of fingerprint image segmentation methods [J]. J4, 2010, 45(7): 94-101. |
[3] | ZHANG Xiao-mei,JIA Tong-hui,YIN Yi-long,ZHAN Xiao-si . Ridge distance estimation methods based on multi-peak detection and energy weight [J]. J4, 2008, 43(3): 34-39 . |
|