关注
Dr. Arpita Sarkar
标题
引用次数
引用次数
年份
A review on performance, security and various biometric template protection schemes for biometric authentication systems
A Sarkar, BK Singh
Multimedia Tools and Applications 79 (37), 27721-27776, 2020
892020
Cryptographic key generation from cancelable fingerprint templates
A Sarkar, BK Singh
2018 4th international conference on recent advances in information …, 2018
222018
Cryptographic key generation scheme from cancellable biometrics
A Sarkar, BK Singh, U Bhaumik
Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2017 …, 2018
132018
A novel session key generation and secure communication establishment protocol using fingerprint biometrics
A Sarkar, BK Singh
Handbook of Computer Networks and Cyber Security: Principles and Paradigms …, 2020
102020
A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function
A Sarkar, BK Singh
Multimedia Tools and Applications 80, 799-829, 2021
82021
RSA key generation from cancelable fingerprint biometrics
A Sarkar, BK Singh, U Bhaumik
2017 International Conference on Computing, Communication, Control and …, 2017
72017
A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography
A Sarkar, B Singh
International Journal of System Assurance Engineering and Management 10 (5 …, 2019
62019
Cancelable biometric based key generation for symmetric cryptography
A Sarkar, BK Singh
2017 International Conference on Inventive Communication and Computational …, 2017
62017
A review on different biometric template protection methods
A Sarkar, BK Singh
Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021
52021
A cancelable fingerprint biometric based session key establishment protocol
A Sarkar, BK Singh
Multimedia Tools and Applications 78, 21645-21671, 2019
42019
A Review on Security Attacks in Biometric Authentication Systems
A Sarkar, BK Singh
International Research Journal of Engineering and Technology 5 (12), 1300-1304, 2018
32018
Design of a dual signature scheme using ECDSA in set protocol
A Sarkar, S Tripathi
International Journal of Computer Applications 88 (11), 2014
32014
Authentication scheme using novel chaff generation method in fuzzy vault.
M Singh, R Shaw, A Sarkar, BK Singh
RICE, 89-92, 2017
12017
Removal of certificates from set protocol using certificateless public key cryptography
A Sarkar, S Tripathi
International Journal of Network Security & Its Applications 4 (6), 157, 2012
12012
Design of a hybrid approach using a revocable technique and steganographic text color coding technique for fingerprint template protection
A Sarkar, BK Singh
Multimedia Tools and Applications 80 (13), 20641-20670, 2021
2021
DESIGN OF TEMPLATE PROTECTION SCHEMES FOR BIOMETRIC AUTHENTICATION SYSTEMS
A Sarkar
NIT Jamshedpur, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–16