[1] |
WANG H , SHENG B , LI Q . Elliptic curve cryptography-based access control in sensor networks[J]. International Journal of Secu-rity and Networks, 2006,1(3/4):127-137.
|
[2] |
HE D , GAO Y , CHAN S , et al. An enhanced two-factor user au-thentication scheme in wireless sensor networks[J]. Ad Hoc and Sensor Wireless Networks, 2010,10(4):361-371.
|
[3] |
SONG H , ZHU S , ZHANG W , et al. Least privilege and privilege deprivation: toward tolerating mobile sink compromises in wire-less sensor networks[J]. ACM Transactions on Sensor Networks, 2008,4(4).
|
[4] |
WANG H , LI Q . Distributed user access control in sensor net-works[J]. Lecture Notes in Computer Science, 2006(4026):305-320.
|
[5] |
ZHANG R , ZHANG Y , REN K . DP2AC: distributed privacy-preserving access control in sensor networks[C]// The IEEE Info-com. 2009:1251-1259.
|
[6] |
Trusted mobile platform hardware architecture description[EB/OL]. .
|
[7] |
Trusted mobile platform software architecture description[EB/OL]. .
|
[8] |
Trusted mobile platform protocol specification document[EB/OL]. .
|
[9] |
TPM main part 2: TPM structures[EB/OL]. .
|
[10] |
Infineon technologies. Infineon technologies TPM[EB/OL]. .
|
[11] |
A trusted biometric system[EB/OL]. .
|
[12] |
郑宇 . 4G无线网络安全若干关键技术研究[D]. 成都:西南交通大学, 2006.
|
|
ZHENG Y . Some key technologies used in 4G wireless network security research[D]. Chengdu: Southwest Jiaotong University, 2006.
|
[13] |
张磊 . 基于物联网的安全生产动态监管系统的研究与设计[D]. 厦门:厦门大学, 2012.
|
|
ZHANG L . Dynamic production safety supervision system based on Internet of things in the research and design[D]. Xiamen Uni-versity, 2012.
|
[14] |
何道敬 . 无线网络安全的关键技术研究[D]. 杭州:浙江大学, 2012.
|
|
HE D J . The key technology of wireless network security re-search[D]. Hangzhou: Zhejiang University, 2012.
|
[15] |
BAZEN A M , GEREZ S H . Systematic methods for the computa-tion of the directional fields and singular points of fingeprrints[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,24(7):905-929.
|
[16] |
LEE C J , WANG S D . Fingerprint feature extarction by principal gabor basis function[J]. Pattern Recognition, 2001,34:2245-2248.
|
[17] |
JAIN A K , HONG L , PANKANTI S , et al. An identity authentica-tion system using finger print[J]. Proceedings of the IEEE, 1997,85(9):1365-1388.
|
[18] |
ROSS A , DASS S , JAIN A . A deformable model for fingerprint matching[J]. Pattern Recognition, 2005,38:95-103.
|
[19] |
CAPPELLI R , MAIO D , MALTONI D . Modeling plastic distortion in fingerprint images[C]// Advances in Pattern Recognition —ICAPR 2001. 2001:371-378.
|
[20] |
BAZEN A M , GEREZ S H . An intrinsic coordinate system for fingerprint matching[J]. Lecture Notes in Computer Science, 2001,2091:198-204.
|
[21] |
SENIOR A , BOLLE R . Improved fingerprint matching by distort-ing removal[J]. IEICE Transaction Information and System, Special Issue on Biomertics, 2001(7):825-831.
|
[22] |
BAZEN A M , GEREZ S H . Elastic minutiae matching by means of thin-plate spline models[C]// The International Conference on Pat-tern Recognition. 2002:985-988.
|
[23] |
ROSS A , DASS S C , JAIN A K . Estimating fingerprint deforma-tion[C]// The International Conference on Biometric Authentication. 2004:249-255.
|
[24] |
祝恩 . 低质量指纹图像的特征提取与识别技术的研究[D]. 湖南:国防科技大学, 2005.
|
|
ZHU E . Low quality fingerprint image feature extraction and rec-ognition technology research[D]. Hunan: National University of Defense Technology, 2005.
|
[25] |
GLASBEY C A , WRIGHT F . An algorithm for unwarping multi-track electrophoretic gels[J]. Electrophoresis, 1994,15(1):143-148.
|