|
Agrawal D., Archambeault B., Rao J. & Rohtagi P.2003. The em-side channel(s). In Workshop on Cryptographic Hardware and Embedded Systems, CHES. LNCS, 2523, 29–45. Springer. |
|
Ambalakat P.2005. Security of Biometric Authentication Systems, 21st Computer Science Seminar, SA1-T1-1, 2,www.rh.edu/rhb/csseminar2005/SessionA1/ambalakat.pdf. |
|
BATH Iris Database website, 2004. http://www.smartsensors.co.uk/irisweb/ (accessed 21 November 2014). |
|
Bonato L. V., Molz R. F., Furtado J. C., Ferrão M. F. & Moraes F. G.2003. (a) Design of a fingerprint system using a hardware/software environment. In Proceedings of the 2003 ACM/SIGDA 11th International Symposium on Field Programmable Gate Arrays, v.1, 240–240, ACM New York press. ISBN: 1-58113-651-X. |
|
Canny J.1986. A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence8, 679–698. |
|
Chinese Academy of Sciences Institute of Automation (CASIA) Iris Image Database (ver. 1.0) 2002. http://www.nlpr.ia.ac.cn/english/irds/Databases/databases.html (accessed 21 November 2014). |
|
Conti V., Militello C., Sorbello F. & Vitabile S.2010. A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems. IEEE Transactions on Systems, Man, and Cybernetics (SMC) Part C: Applications & Reviews40(4), 384–395. |
|
Conti V., Militello C., Vitabile S. & Sorbello F.2009. A multimodal technique for an embedded fingerprint recognizer in mobile payment systems. International Journal of Mobile Information Systems5(2), 105–124. |
|
Daugman J. G.1993. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence15(11), 1148–1161. |
|
De Mira J.Jr. & Mayer J.2003. Image feature extraction for application of biometric identification of iris – a morphological approach. In Proceedings of the XVI Brazilian Symposium on Computer Graphics and Image Processing, 1, 12–20. |
|
Field D. J.1987. Relations between the statistics of natural images and the response profiles of cortical cells. Journal of the Optical Society of America, 4, 2379–2394. |
|
Fingerprint Acquisition Sensor website, 2002. http://www.biometrika.it/eng/fx2000.html (accessed 21 November 2014). |
|
Fingerprint Verification Competition website2002. http://bias.csr.unibo.it/fvc2002/ (accessed 21 November 2014). |
|
Fons M., Fons F. & Canto E.2006. Design of FPGA-based hardware accelerators for on-line fingerprint matcher systems. Research in Microelectronics and Electronics, 333–336, doi: 10.1109/RME.2006.1689964. |
|
Garcia M. L. & Canto Navarro E. F.2006. FPGA implementation of a ridge extraction fingerprint algorithm based on microblaze and hardware coprocessor. In International IEEE Conference on Field Programmable Logic and Applications, ISBN 1-4244-0312-X, 1–5. |
|
Hough P. V. C.1962. Method and Means for Recognizing Complex Patterns. US Patent 3.069.654. |
|
Iris Acquisition Sensor, 2010. http://uidai.gov.in/biometric-devices.html (accessed 21 November 2014). |
|
Kocher P. C.1999. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Cryptography Research Inc. http://cryptography.com. |
|
Kocher P. C., Jaffe J. & Benjamin Jun B.1999. Differential Power Analysis, Cryptography Research Inc. http://cryptography.com. |
|
Lopez M. & Canto E.2008. FPGA implementation of a minutiae extraction fingerprint algorithm. In IEEE International Symposium on Industrial Electronics, 1920–1925. |
|
Mali M., Novak F. & Biasizzo A.2005. Hardware implementation of AES algorithm. Journal of Electrical Engineering56(9–10), 265–269. |
|
Mane V. M. & Jadhav D. V.2011. Review of multimodal biometrics: applications, challenges and research areas. International Journal of Biometrics and Bioinformatics (IJBB)3(5), 90–95. |
|
Matsumoto T., Matsumoto H., Yamada K. & Hoshino S.2002. Impact of artificial gummy fingers on fingerprint systems. In Proceedings of the SPIE, van Renesse, R. L. (ed.), Optical Security and Counterfeit Deterrence Techniques IV 4677, 275–289. |
|
Mentor Graphics website2008. http://www.mentor.com/products/fpga/handel-c/dk-design-suite/, http://www.mentor.com/products/fpga/handel-c/rc-series-platforms/ (accessed 21 November 2014). |
|
Michener J. R. & Acar T.2000. Security domains: key management in large-scale systems. IEEE Software17(5), 52–58. |
|
Militello C., Conti V., Vitabile S. & Sorbello F.2008. A novel embedded fingerprints authentication system based on singularity points. In Proceedings of the 2nd International Conference on Complex, Intelligent and Software Intensive Systems, ISBN/ISSN: 0-7695-3509-1. IEEE Computer Society, 72–78. |
|
Militello C., Conti V., Vitabile S. & Sorbello F.2009. An embedded module for iris micro-characteristics extraction. In Proceedings of the 3rd International Conference on Complex, Intelligent and Software Intensive Systems. IEEE Computer Society Press, 223–230. |
|
Militello C., Conti V., Vitabile S. & Sorbello F.2010. An embedded iris recognizer for portable and mobile devices. International Journal of Computer Systems Science and Engineering (IJ-CSSE)25(2). Special Issue on Frontiers in Complex, Intelligent and Software Intensive Systems. 119–131. |
|
Militello C., Conti V., Vitabile S. & Sorbello F.2011. Embedded access points for trusted data and resources access in HPC systems. The Journal of Supercomputing55 (1) Special Issue on High Performance Trusted Computing. 4–27. |
|
Miyazawa K., Ito K., Aok T., Kobayashi K. & Katsumata A.2006. An iris recognition system using phase-based image matching, In IEEE International Conference on Image Processing, 325–328. |
|
Nielsen R. & Hamilton B. A.2005. Observations from the deployment of a large scale PKI. In 4th Annual PKI R&D Workshop: Multiple Paths to Trust. NIST, April 19–21. |
|
Niu Z., Zhou K., Jiang H., Yang T. & Yan W.2009. Identification and authentication in large-scale storage systems. In IEEE International Conference on Networking, Architecture, and Storage, 421–427. |
|
Oey M. A., Warnier M., Brazier F. M. T.2010. Security in large-scale open distributed multi-agent systems. In Autonomous Agents, ISBN 978-953-307-089-6, Kordic, V. (ed.). InTech, 107–129. http://www.intechopen.com/articles/show/title/security-in-large-scale-open-distributed-multi-agent-systems. |
|
Ross A. & Jain A.2003. Information fusion in biometrics. Pattern Recognition Letters24, 2115–2125. |
|
Schaumont P., Sakiyama K., Fan Y., Hwang D., Yang S., Hodjat A., Lai B. & Verbauwhede I.2003. Testing ThumbPod: softcore bugs are hard to find. In 8th IEEE International High-Level Design Validation and Test Workshop, ISBN:0-7803-8236-6, 77–82. |
|
Shi J. Q. Z., Zhao X. & Wang Y.2004. A novel fingerprint matching method based on the Hough transform without quantization of the Hough space. In Proceedings of the 3rd International Conference on Image and Graphics, ISBN: 0-7695-2244-0, 262–265. |
|
Snijder M.2006. Security & Privacy in Large Scale Biometric Systems, EC JRC/IPTS, European Biometrics Forum, September 25. |
|
Sung H., Lim J., Park J. & Lee Y.2004. Iris recognition using collarette boundary localization. In Proceedings of the 17th International IEEE Conference on Pattern Recognition, 4, 857–860. |
|
UK Biometrics Working Group (BWG)2003. Biometrics Security Concerns. BWG. |
|
Vitabile S., Conti V., Lentini G. & Sorbello F.2005. An intelligent sensor for fingerprint recognition. In Proceedings of the International Conference on Embedded and Ubiquitous Computing, ISBN: 3-540-30807-5, Lecture Note in Computer Science 3824, 27–36. Springer-Verlag. |
|
Xilinx website2008. http://www.xilinx.com/ (accessed 21 November 2014). |
|
Yoo J. H., Ko J. G., Chung Y. S., Jung S. U., Kim K. H., Moon K. Y. & Chung K.2007. Design of Embedded Multimodal Biometric Systems, 3rd International IEEE Conference on Signal-Image Technologies and Internet-Based System, pp. 1058-1062, DOI 10.1109/SITIS.2007.130. |
|
Zhang H., Yin Y. & Ren G.2004. An improved method for singularity detection of fingerprint images. Book Advances in Biometric Person Authentication. Publisher Springer Berlin/Heidelberg. 3338, 516–524. ISBN 978-3-540-24029-7. |