共 50 条
- [31] Secure interoperation of secure distributed databases - An architecture verification case study FM'99-FORMAL METHODS, 1999, 1708 : 701 - 717
- [33] POSTER: Privacy Enhanced Secure Location Verification CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1793 - 1795
- [34] An architecture for secure generation and verification of electronic coupons USENIX ASSOCIATION PROCEEDINGS OF THE 2001 USENIX ANNUAL TECHNICAL CONFERENCE, 2001, : 51 - 63
- [38] Efficient and Secure Fingerprint Verification for Embedded Devices EURASIP Journal on Advances in Signal Processing, 2006
- [39] SPEAKER VERIFICATION USING SECURE BINARY EMBEDDINGS 2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
- [40] A Secure Framework for Location Verification in Pervasive Computing WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 388 - 397