Voting through Mobile using Biometric Template with Integration of Spatial Cloud Computing and Data Hiding Security
Abstract
Keywords
Full Text:
PDFReferences
A. K. Jain, R. Bolle, and S. Pankanti, eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer-Verlag, 2003.
U. Uludag and A. K. Jain, “Attacks on biometric systems: a case study in fingerprints,” in Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633, (San Jose, CA),January 2004.
J. Douceur, “The sybil attack,” in Proc. IPTPS Workshop, Mar. 2002,pp. 251–260.
S. Kent and T. Polk, “Public-key infrastructure (x.509) (pkix) charter.” [Online]. Available: http://www.ietf.org/html.charters/pkixcharter. html.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” in Proc. 9th IEEE Int. Conf. Network Protocols, 2001, pp. 251–260.
S. Capkun, L. Buttyan, and J.-P. Hubaux, “Self-organized public-key management for mobile ad hoc networks,” IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52–64, Jan./Mar. 2003.
A. Cheng and E. Friedman, “Sybilproof reputation mechanisms,” in Proc. ACMWorkshop Economics Peer-to-Peer Systems, Aug. 2005, pp. 128–132.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.