Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server

In recent years, biometric authentication system ( BAS ) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems ( MBS ) have been extensively accepted in various fields. The m...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Applied intelligence (Dordrecht, Netherlands) Ročník 50; číslo 9; s. 2848 - 2866
Hlavní autoři: Morampudi, Mahesh Kumar, Veldandi, Sowmya, Prasad, Munaga V. N. K., Raju, U. S. N.
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York Springer US 01.09.2020
Springer Nature B.V
Témata:
ISSN:0924-669X, 1573-7497
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In recent years, biometric authentication system ( BAS ) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems ( MBS ) have been extensively accepted in various fields. The main step in MBS is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many BAS based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel P rivacy P reserving ( PP ) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses F ully H omomorphic E ncryption ( FHE ) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a PP iris authentication system using P rivate M ulti- C lass P erceptron ( PMCP ) by using the properties of FHE . Moreover, we propose C ontradistinguish S imilarity A nalysis ( CSA ), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches.
AbstractList In recent years, biometric authentication system ( BAS ) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems ( MBS ) have been extensively accepted in various fields. The main step in MBS is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many BAS based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel P rivacy P reserving ( PP ) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses F ully H omomorphic E ncryption ( FHE ) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a PP iris authentication system using P rivate M ulti- C lass P erceptron ( PMCP ) by using the properties of FHE . Moreover, we propose C ontradistinguish S imilarity A nalysis ( CSA ), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches.
In recent years, biometric authentication system (BAS) has become the most promising and popular authentication system in identity management. Due to its capability to solve the limitations of unimodal systems, multi-biometric systems (MBS) have been extensively accepted in various fields. The main step in MBS is information fusion. On the other hand, directly storing the fused templates into a centralized server leads to privacy concerns. Recently, many BAS based on homomorphic encryption has been introduced to provide confidentiality for the fused templates. However, most of the existing solutions rely on an implication of the assumption that the server is “Honest-but-Curious”. As a result, the compromise of such server results into entire system vulnerability. To address this, we propose a novel P rivacy P reserving (PP) multi-instance iris remote authentication system to accord with attacks at the malicious server and over the transmission channel. Our scheme uses F ully H omomorphic E ncryption (FHE) to achieve the confidentiality of the fused iris templates and polynomial factorization algorithm to achieve the integrity of the matching result. We propose a PP iris authentication system using P rivate M ulti-C lass P erceptron (PMCP) by using the properties of FHE. Moreover, we propose C ontradistinguish S imilarity A nalysis (CSA), a feature level fusion technique that minimizes the between-class correlations and maximizes the pair-wise correlations. Our method has experimented on IITD and CASIA-V3-Interval iris databases to check the effectiveness and robustness. Experimental results show that our method provides improved accuracy, and eliminates the need to trust the cloud server when compared to the state-of-the-art approaches.
Author Morampudi, Mahesh Kumar
Raju, U. S. N.
Prasad, Munaga V. N. K.
Veldandi, Sowmya
Author_xml – sequence: 1
  givenname: Mahesh Kumar
  orcidid: 0000-0002-6888-4637
  surname: Morampudi
  fullname: Morampudi, Mahesh Kumar
  email: morampudimahesh@gmail.com
  organization: Centre for Affordable Technologies Lab, Institute for Development and Research in Banking Technology, National Institute of Technology
– sequence: 2
  givenname: Sowmya
  surname: Veldandi
  fullname: Veldandi, Sowmya
  organization: Atal Bihari Vajpayee Indian Institute of Information Technology and Management
– sequence: 3
  givenname: Munaga V. N. K.
  surname: Prasad
  fullname: Prasad, Munaga V. N. K.
  organization: Centre for Affordable Technologies Lab, Institute for Development and Research in Banking Technology
– sequence: 4
  givenname: U. S. N.
  surname: Raju
  fullname: Raju, U. S. N.
  organization: National Institute of Technology
BookMark eNp9kMtKAzEUhoNUsK2-gKsB19FkkpkkSyneQHGj4C6kmdM2ZSZTk0zBtzd2BMFFIXAW-b9z-WZo4nsPCF1Sck0JETeREi4VJiXBhNaSYnWCprQSDAuuxARNiSo5rmv1cYZmMW4JIYwROkWbl6FNDjsfk_EWChdcLAJ0fYLCDGkDPjlrkut9MUTn18UuuL3Jn92Bs62JsdhBsLBLIYfy60zrrOuHWNi2H5oiQthDOEenK9NGuPitc_R-f_e2eMTPrw9Pi9tnbBlVCVO-pMRUXBjBuKpk1VC7LJXJp9QrkGBF2XDGBUjb0LquSUPBKlWxDAhQhs3R1dh3F_rPAWLS234IPo_UJS9lKSSlJKfKMWVDH2OAlc53dSZ8aUr0j1E9GtXZqD4Y1SpD8h9kXTq4ScG49jjKRjTmOX4N4W-rI9Q3oTiOnw
CitedBy_id crossref_primary_10_1007_s41870_021_00819_3
crossref_primary_10_1007_s10489_021_02401_7
crossref_primary_10_1109_ACCESS_2024_3501368
crossref_primary_10_1088_1742_6596_2030_1_012063
crossref_primary_10_1007_s10489_022_03193_0
crossref_primary_10_1088_1742_6596_1650_3_032075
Cites_doi 10.1109/TIFS.2016.2569061
10.1186/1687-417X-2011-3
10.1109/MSP.2018.3761723
10.1016/j.patcog.2009.08.016
10.1016/j.patcog.2004.12.013
10.1109/MSECP.2003.1193209
10.1109/MSP.2015.2434151
10.1002/sec.1164
10.1109/TCSVT.2003.818350
10.1109/MSP.2015.2437652
10.1016/j.patcog.2017.01.024
10.1007/s10623-012-9720-4
10.1186/s13635-016-0049-9
10.1007/s10623-015-0079-1
10.1016/j.eswa.2019.01.010
10.1186/1687-417X-2007-037343
10.1109/TIFS.2015.2416688
10.1016/S0031-3203(02)00262-5
10.1109/TIFS.2011.2108650
10.1109/83.913594
10.1155/2008/579416
10.1109/TIFS.2014.2384735
10.1016/j.patcog.2019.04.010
10.1016/j.asoc.2018.02.047
10.1109/TIFS.2011.2108288
10.1098/rspb.2001.1696
10.1108/IJPCC-02-2015-0012
10.1007/s11042-017-4668-z
10.1145/581571.581573
10.1007/s10044-017-0656-1
10.1007/3-540-48910-X_16
10.1109/CCC.2010.26
10.1007/978-3-642-36362-7_1
10.1109/TETC.2018.2794611
10.1109/ICCUBEA.2018.8697811
10.1007/978-3-642-13190-5_1
10.1109/CCST.2006.313444
10.1007/978-3-642-14623-7_25
10.1145/1101149.1101236
10.1007/978-3-642-42045-0_16
10.1007/978-1-4471-6784-6_16
10.1007/978-3-642-29011-4_28
10.1007/s10462-019-09776-7
10.1007/978-3-642-23822-2_11
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8FD
8FE
8FG
8FK
8FL
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L6V
L7M
L~C
L~D
M0C
M0N
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PSYQQ
PTHSS
Q9U
DOI 10.1007/s10489-020-01681-9
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Global (Alumni Edition)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Materials Science & Engineering Collection
ProQuest Central (Alumni Edition)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest One Psychology
Engineering Collection
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
ProQuest One Psychology
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Engineering Collection
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
Engineering Database
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7497
EndPage 2866
ExternalDocumentID 10_1007_s10489_020_01681_9
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
-~X
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
2.D
203
23M
28-
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
77K
7WY
8FE
8FG
8FL
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABIVO
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTAH
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
L6V
LAK
LLZTM
M0C
M0N
M4Y
M7S
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PSYQQ
PT4
PT5
PTHSS
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z81
Z83
Z88
Z8M
Z8N
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
ZY4
~A9
~EX
77I
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
Q9U
ID FETCH-LOGICAL-c319t-14b10a547a7349585d1cb29a5736fe8ec72d4347e8cd16660d1ec99537a77e9a3
IEDL.DBID RSV
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000522011800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0924-669X
IngestDate Wed Nov 05 14:50:12 EST 2025
Tue Nov 18 22:24:54 EST 2025
Sat Nov 29 05:33:20 EST 2025
Fri Feb 21 02:26:54 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 9
Keywords Fully homomorphic encryption
Contradistinguish similarity analysis
Correlation analysis
Private multi-class perceptron
Multi-biometric systems
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-14b10a547a7349585d1cb29a5736fe8ec72d4347e8cd16660d1ec99537a77e9a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6888-4637
PQID 2428278110
PQPubID 326365
PageCount 19
ParticipantIDs proquest_journals_2428278110
crossref_primary_10_1007_s10489_020_01681_9
crossref_citationtrail_10_1007_s10489_020_01681_9
springer_journals_10_1007_s10489_020_01681_9
PublicationCentury 2000
PublicationDate 20200900
2020-09-00
20200901
PublicationDateYYYYMMDD 2020-09-01
PublicationDate_xml – month: 9
  year: 2020
  text: 20200900
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Boston
PublicationSubtitle The International Journal of Research on Intelligent Systems for Real Life Complex Problems
PublicationTitle Applied intelligence (Dordrecht, Netherlands)
PublicationTitleAbbrev Appl Intell
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Fan, Vercauteren (CR38) 2012; 2012
Kumar, Passi (CR47) 2010; 43
CR39
CR36
CR35
Orlandi, Piva, Barni (CR43) 2007; 2007
Gomez-Barrero, Maiorana, Galbally, Campisi, Fierrez (CR28) 2017; 67
CR33
Libert, Peters, Joye, Yung (CR37) 2015; 77
CR31
Sun, Zeng, Liu, Heng, Xia (CR9) 2005; 38
Hadid, Evans, Marcel, Fierrez (CR52) 2015; 32
CR2
Jain, Nandakumar, Nagar (CR20) 2008; 2008
Maiorana, Hine, Campisi (CR21) 2014; 10
CR4
CR3
Yasuda, Shimoyama, Kogure, Yokoyama, Koshiba (CR30) 2015; 8
CR6
Al-Waisy, Qahwaji, Ipson, Al-Fahdawi, Nagem (CR12) 2018; 21
CR48
CR46
CR44
Smart, Vercauteren (CR40) 2014; 71
CR41
Daugman (CR1) 2004; 14
Liu, Huang, Rong, Wang, Xian (CR32) 2015; 10
Mosca (CR49) 2018; 16
Liu, Wechsler (CR7) 2001; 10
Yang, Jy, Zhang, Jf (CR8) 2003; 36
Rathgeb, Uhl (CR23) 2011; 2011
Alberto Torres, Bhattacharjee, Srinivasan (CR29) 2015; 11
Rathgeb, Tams, Wagner, Busch (CR13) 2016; 2016
Venugopalan, Savvides (CR19) 2011; 6
CR18
CR11
Anderson, Cobb, Korpela, Lebofsky, Werthimer (CR45) 2002; 45
CR51
Setty, McPherson, Blumberg, Walfish (CR34) 2012; 1
CR50
Barni, Failla, Lazzeretti, Sadeghi, Schneider (CR42) 2011; 6
Haghighat, Abdel-Mottaleb, Alhalabi (CR10) 2016; 11
Patel, Ratha, Chellappa (CR24) 2015; 32
Barpanda, Sa, Marques, Majhi, Bakshi (CR14) 2018; 77
Sardar, Mitra, Shankar (CR15) 2018; 67
Zhao, Kumar (CR17) 2019; 93
Fontaine, Galand (CR25) 2007; 2007
CR27
CR26
Prabhakar, Pankanti, Jain (CR22) 2003; 2
Daugman, Downing (CR5) 2001; 268
Arsalan, Kim, Lee, Owais, Park (CR16) 2019; 122
1681_CR41
J Yang (1681_CR8) 2003; 36
J Liu (1681_CR32) 2015; 10
M Yasuda (1681_CR30) 2015; 8
ST Setty (1681_CR34) 2012; 1
C Liu (1681_CR7) 2001; 10
C Orlandi (1681_CR43) 2007; 2007
WA Alberto Torres (1681_CR29) 2015; 11
DP Anderson (1681_CR45) 2002; 45
B Libert (1681_CR37) 2015; 77
AK Jain (1681_CR20) 2008; 2008
J Daugman (1681_CR5) 2001; 268
AS Al-Waisy (1681_CR12) 2018; 21
1681_CR48
S Prabhakar (1681_CR22) 2003; 2
C Rathgeb (1681_CR13) 2016; 2016
1681_CR44
E Maiorana (1681_CR21) 2014; 10
A Kumar (1681_CR47) 2010; 43
1681_CR46
1681_CR31
M Mosca (1681_CR49) 2018; 16
M Arsalan (1681_CR16) 2019; 122
VM Patel (1681_CR24) 2015; 32
Z Zhao (1681_CR17) 2019; 93
1681_CR39
NP Smart (1681_CR40) 2014; 71
1681_CR33
1681_CR36
SS Barpanda (1681_CR14) 2018; 77
1681_CR35
M Barni (1681_CR42) 2011; 6
J Daugman (1681_CR1) 2004; 14
1681_CR27
1681_CR26
1681_CR2
M Haghighat (1681_CR10) 2016; 11
1681_CR3
1681_CR4
S Venugopalan (1681_CR19) 2011; 6
QS Sun (1681_CR9) 2005; 38
1681_CR6
1681_CR51
J Fan (1681_CR38) 2012; 2012
1681_CR50
M Sardar (1681_CR15) 2018; 67
C Rathgeb (1681_CR23) 2011; 2011
M Gomez-Barrero (1681_CR28) 2017; 67
A Hadid (1681_CR52) 2015; 32
1681_CR18
C Fontaine (1681_CR25) 2007; 2007
1681_CR11
References_xml – volume: 11
  start-page: 1984
  issue: 9
  year: 2016
  end-page: 1996
  ident: CR10
  article-title: Discriminant correlation analysis: real-time feature level fusion for multimodal biometric recognition
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2016.2569061
– volume: 2011
  start-page: 3
  issue: 1
  year: 2011
  ident: CR23
  article-title: A survey on biometric cryptosystems and cancelable biometrics
  publication-title: EURASIP J Inf Secur
  doi: 10.1186/1687-417X-2011-3
– volume: 16
  start-page: 38
  issue: 5
  year: 2018
  end-page: 41
  ident: CR49
  article-title: Cybersecurity in an era with quantum computers: will we be ready?
  publication-title: IEEE Secur Privacy
  doi: 10.1109/MSP.2018.3761723
– volume: 43
  start-page: 1016
  issue: 3
  year: 2010
  end-page: 1026
  ident: CR47
  article-title: Comparison and combination of iris matchers for reliable personal authentication
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2009.08.016
– volume: 38
  start-page: 2437
  issue: 12
  year: 2005
  end-page: 2448
  ident: CR9
  article-title: A new method of feature fusion and its application in image recognition
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2004.12.013
– ident: CR4
– volume: 2
  start-page: 33
  year: 2003
  end-page: 42
  ident: CR22
  article-title: Biometric recognition: security and privacy concerns
  publication-title: IEEE Secur Privac
  doi: 10.1109/MSECP.2003.1193209
– ident: CR39
– volume: 32
  start-page: 54
  issue: 5
  year: 2015
  end-page: 65
  ident: CR24
  article-title: Cancelable biometrics: a review
  publication-title: IEEE Signal Process Mag
  doi: 10.1109/MSP.2015.2434151
– volume: 8
  start-page: 2194
  issue: 13
  year: 2015
  end-page: 2213
  ident: CR30
  article-title: New packing method in somewhat homomorphic encryption and its applications
  publication-title: Secur Commun Netw
  doi: 10.1002/sec.1164
– volume: 14
  start-page: 21
  issue: 1
  year: 2004
  end-page: 30
  ident: CR1
  article-title: How iris recognition works
  publication-title: IEEE Trans Cir and Sys for Video Technol
  doi: 10.1109/TCSVT.2003.818350
– ident: CR51
– volume: 32
  start-page: 20
  issue: 5
  year: 2015
  end-page: 30
  ident: CR52
  article-title: Biometrics systems under spoofing attack: an evaluation methodology and lessons learned
  publication-title: IEEE Signal Process Mag
  doi: 10.1109/MSP.2015.2437652
– ident: CR35
– volume: 67
  start-page: 149
  year: 2017
  end-page: 163
  ident: CR28
  article-title: Multi-biometric template protection based on homomorphic encryption
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2017.01.024
– volume: 71
  start-page: 57
  issue: 1
  year: 2014
  end-page: 81
  ident: CR40
  article-title: Fully homomorphic simd operations
  publication-title: Des Codes Cryptogr
  doi: 10.1007/s10623-012-9720-4
– volume: 2016
  start-page: 26
  issue: 1
  year: 2016
  ident: CR13
  article-title: Unlinkable improved multi-biometric iris fuzzy vault
  publication-title: EURASIP J Inf Secur
  doi: 10.1186/s13635-016-0049-9
– volume: 77
  start-page: 441
  issue: 2-3
  year: 2015
  end-page: 477
  ident: CR37
  article-title: Linearly homomorphic structure-preserving signatures and their applications
  publication-title: Des Codes Crypt
  doi: 10.1007/s10623-015-0079-1
– ident: CR46
– volume: 122
  start-page: 217
  year: 2019
  end-page: 241
  ident: CR16
  article-title: Fred-net: fully residual encoder–decoder network for accurate iris segmentation
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2019.01.010
– ident: CR50
– volume: 2007
  start-page: 037343
  issue: 1
  year: 2007
  ident: CR43
  article-title: Oblivious neural network computing via homomorphic encryption
  publication-title: EURASIP J Inform Secur
  doi: 10.1186/1687-417X-2007-037343
– volume: 10
  start-page: 1513
  issue: 7
  year: 2015
  end-page: 1528
  ident: CR32
  article-title: Privacy-preserving public auditing for regenerating-code-based cloud storage
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2015.2416688
– ident: CR11
– ident: CR36
– volume: 36
  start-page: 1369
  issue: 6
  year: 2003
  end-page: 1381
  ident: CR8
  article-title: Feature fusion: parallel strategy vs. serial strategy
  publication-title: Pattern Recogn
  doi: 10.1016/S0031-3203(02)00262-5
– volume: 6
  start-page: 452
  issue: 2
  year: 2011
  end-page: 468
  ident: CR42
  article-title: Privacy-preserving ecg classification with branching programs and neural networks
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2011.2108650
– volume: 10
  start-page: 598
  issue: 4
  year: 2001
  end-page: 608
  ident: CR7
  article-title: A shape- and texture-based enhanced fisher classifier for face recognition
  publication-title: IEEE Trans Image Proc: Publ IEEE Signal Process Soc
  doi: 10.1109/83.913594
– ident: CR26
– volume: 1
  start-page: 17
  year: 2012
  ident: CR34
  article-title: Making argument systems for outsourced computation practical (sometimes)
  publication-title: NDSS
– ident: CR18
– volume: 2012
  start-page: 144
  year: 2012
  ident: CR38
  article-title: Somewhat practical fully homomorphic encryption
  publication-title: IACR Cryptology ePrint Archive
– volume: 2008
  start-page: 113
  year: 2008
  ident: CR20
  article-title: Biometric template security
  publication-title: EURASIP J Adv Signal Process
  doi: 10.1155/2008/579416
– volume: 10
  start-page: 900
  issue: 5
  year: 2014
  end-page: 915
  ident: CR21
  article-title: Hill-climbing attacks on multibiometrics recognition systems
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2014.2384735
– ident: CR2
– volume: 93
  start-page: 546
  year: 2019
  end-page: 557
  ident: CR17
  article-title: A deep learning based unified framework to detect, segment and recognize irises using spatially corresponding features
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2019.04.010
– volume: 67
  start-page: 61
  year: 2018
  end-page: 69
  ident: CR15
  article-title: Iris localization using rough entropy and csa: a soft computing approach
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2018.02.047
– volume: 2007
  start-page: 15
  year: 2007
  ident: CR25
  article-title: A survey of homomorphic encryption for nonspecialists
  publication-title: EURASIP J Inf Secur
– ident: CR33
– volume: 6
  start-page: 385
  issue: 2
  year: 2011
  end-page: 395
  ident: CR19
  article-title: How to generate spoofed irises from an iris code template
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2011.2108288
– ident: CR6
– volume: 268
  start-page: 1737
  issue: 1477
  year: 2001
  end-page: 40
  ident: CR5
  article-title: Epigenetic randomness, complexity and singularity of human iris patterns
  publication-title: Proc Biol Sci/ R Soc
  doi: 10.1098/rspb.2001.1696
– ident: CR27
– ident: CR44
– volume: 11
  start-page: 151
  issue: 2
  year: 2015
  end-page: 168
  ident: CR29
  article-title: Privacy-preserving biometrics authentication systems using fully homomorphic encryption
  publication-title: Int J Pervasive Comput Commun
  doi: 10.1108/IJPCC-02-2015-0012
– ident: CR48
– volume: 77
  start-page: 7637
  issue: 6
  year: 2018
  end-page: 7674
  ident: CR14
  article-title: Iris recognition with tunable filter bank based feature
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-017-4668-z
– ident: CR3
– ident: CR31
– volume: 45
  start-page: 56
  issue: 11
  year: 2002
  end-page: 61
  ident: CR45
  article-title: Seti@ home: an experiment in public-resource computing
  publication-title: Commun ACM
  doi: 10.1145/581571.581573
– ident: CR41
– volume: 21
  start-page: 783
  issue: 3
  year: 2018
  end-page: 802
  ident: CR12
  article-title: A multi-biometric iris recognition system based on a deep learning approach
  publication-title: Pattern Anal Applic
  doi: 10.1007/s10044-017-0656-1
– volume: 11
  start-page: 151
  issue: 2
  year: 2015
  ident: 1681_CR29
  publication-title: Int J Pervasive Comput Commun
  doi: 10.1108/IJPCC-02-2015-0012
– volume: 268
  start-page: 1737
  issue: 1477
  year: 2001
  ident: 1681_CR5
  publication-title: Proc Biol Sci/ R Soc
  doi: 10.1098/rspb.2001.1696
– volume: 8
  start-page: 2194
  issue: 13
  year: 2015
  ident: 1681_CR30
  publication-title: Secur Commun Netw
  doi: 10.1002/sec.1164
– volume: 11
  start-page: 1984
  issue: 9
  year: 2016
  ident: 1681_CR10
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2016.2569061
– ident: 1681_CR3
– volume: 93
  start-page: 546
  year: 2019
  ident: 1681_CR17
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2019.04.010
– volume: 2007
  start-page: 037343
  issue: 1
  year: 2007
  ident: 1681_CR43
  publication-title: EURASIP J Inform Secur
  doi: 10.1186/1687-417X-2007-037343
– volume: 77
  start-page: 7637
  issue: 6
  year: 2018
  ident: 1681_CR14
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-017-4668-z
– volume: 71
  start-page: 57
  issue: 1
  year: 2014
  ident: 1681_CR40
  publication-title: Des Codes Cryptogr
  doi: 10.1007/s10623-012-9720-4
– ident: 1681_CR27
  doi: 10.1007/3-540-48910-X_16
– volume: 67
  start-page: 149
  year: 2017
  ident: 1681_CR28
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2017.01.024
– ident: 1681_CR50
  doi: 10.1109/CCC.2010.26
– volume: 2011
  start-page: 3
  issue: 1
  year: 2011
  ident: 1681_CR23
  publication-title: EURASIP J Inf Secur
  doi: 10.1186/1687-417X-2011-3
– volume: 32
  start-page: 54
  issue: 5
  year: 2015
  ident: 1681_CR24
  publication-title: IEEE Signal Process Mag
  doi: 10.1109/MSP.2015.2434151
– volume: 10
  start-page: 1513
  issue: 7
  year: 2015
  ident: 1681_CR32
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2015.2416688
– ident: 1681_CR41
  doi: 10.1007/978-3-642-36362-7_1
– volume: 14
  start-page: 21
  issue: 1
  year: 2004
  ident: 1681_CR1
  publication-title: IEEE Trans Cir and Sys for Video Technol
  doi: 10.1109/TCSVT.2003.818350
– ident: 1681_CR33
– volume: 1
  start-page: 17
  year: 2012
  ident: 1681_CR34
  publication-title: NDSS
– volume: 122
  start-page: 217
  year: 2019
  ident: 1681_CR16
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2019.01.010
– ident: 1681_CR31
  doi: 10.1109/TETC.2018.2794611
– volume: 2007
  start-page: 15
  year: 2007
  ident: 1681_CR25
  publication-title: EURASIP J Inf Secur
– volume: 77
  start-page: 441
  issue: 2-3
  year: 2015
  ident: 1681_CR37
  publication-title: Des Codes Crypt
  doi: 10.1007/s10623-015-0079-1
– volume: 6
  start-page: 452
  issue: 2
  year: 2011
  ident: 1681_CR42
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2011.2108650
– ident: 1681_CR11
  doi: 10.1109/ICCUBEA.2018.8697811
– volume: 38
  start-page: 2437
  issue: 12
  year: 2005
  ident: 1681_CR9
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2004.12.013
– volume: 6
  start-page: 385
  issue: 2
  year: 2011
  ident: 1681_CR19
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2011.2108288
– volume: 36
  start-page: 1369
  issue: 6
  year: 2003
  ident: 1681_CR8
  publication-title: Pattern Recogn
  doi: 10.1016/S0031-3203(02)00262-5
– ident: 1681_CR2
– ident: 1681_CR48
  doi: 10.1007/978-3-642-13190-5_1
– volume: 45
  start-page: 56
  issue: 11
  year: 2002
  ident: 1681_CR45
  publication-title: Commun ACM
  doi: 10.1145/581571.581573
– volume: 10
  start-page: 598
  issue: 4
  year: 2001
  ident: 1681_CR7
  publication-title: IEEE Trans Image Proc: Publ IEEE Signal Process Soc
  doi: 10.1109/83.913594
– ident: 1681_CR51
  doi: 10.1109/CCST.2006.313444
– ident: 1681_CR35
  doi: 10.1007/978-3-642-14623-7_25
– ident: 1681_CR46
– volume: 67
  start-page: 61
  year: 2018
  ident: 1681_CR15
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2018.02.047
– volume: 2016
  start-page: 26
  issue: 1
  year: 2016
  ident: 1681_CR13
  publication-title: EURASIP J Inf Secur
  doi: 10.1186/s13635-016-0049-9
– volume: 16
  start-page: 38
  issue: 5
  year: 2018
  ident: 1681_CR49
  publication-title: IEEE Secur Privacy
  doi: 10.1109/MSP.2018.3761723
– ident: 1681_CR6
  doi: 10.1145/1101149.1101236
– volume: 10
  start-page: 900
  issue: 5
  year: 2014
  ident: 1681_CR21
  publication-title: IEEE Trans Inform Forens Secur
  doi: 10.1109/TIFS.2014.2384735
– ident: 1681_CR4
– ident: 1681_CR36
  doi: 10.1007/978-3-642-42045-0_16
– ident: 1681_CR39
  doi: 10.1007/978-1-4471-6784-6_16
– ident: 1681_CR44
  doi: 10.1007/978-3-642-29011-4_28
– volume: 32
  start-page: 20
  issue: 5
  year: 2015
  ident: 1681_CR52
  publication-title: IEEE Signal Process Mag
  doi: 10.1109/MSP.2015.2437652
– volume: 2012
  start-page: 144
  year: 2012
  ident: 1681_CR38
  publication-title: IACR Cryptology ePrint Archive
– volume: 2008
  start-page: 113
  year: 2008
  ident: 1681_CR20
  publication-title: EURASIP J Adv Signal Process
  doi: 10.1155/2008/579416
– ident: 1681_CR18
  doi: 10.1007/s10462-019-09776-7
– volume: 2
  start-page: 33
  year: 2003
  ident: 1681_CR22
  publication-title: IEEE Secur Privac
  doi: 10.1109/MSECP.2003.1193209
– ident: 1681_CR26
  doi: 10.1007/978-3-642-23822-2_11
– volume: 43
  start-page: 1016
  issue: 3
  year: 2010
  ident: 1681_CR47
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2009.08.016
– volume: 21
  start-page: 783
  issue: 3
  year: 2018
  ident: 1681_CR12
  publication-title: Pattern Anal Applic
  doi: 10.1007/s10044-017-0656-1
SSID ssj0003301
Score 2.2707858
Snippet In recent years, biometric authentication system ( BAS ) has become the most promising and popular authentication system in identity management. Due to its...
In recent years, biometric authentication system (BAS) has become the most promising and popular authentication system in identity management. Due to its...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2848
SubjectTerms Algorithms
Artificial Intelligence
Authentication
Biometrics
Computer Science
Confidentiality
Correlation analysis
Data integration
Encryption
Machines
Manufacturing
Mechanical Engineering
Polynomials
Privacy
Processes
SummonAdditionalLinks – databaseName: Computer Science Database
  dbid: K7-
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA5aPXixPrFaJQdvGtxkk01yEhGLIBQPCr0t2WyqBW3r9vH7naTZFgV7Efa2SQh8M5lHvskgdGlKsMGmsEQUxhFuS0UM7WvCCl2wtM8So4rQbEJ2u6rX088x4TaJtMr6TAwHdTmyPkd-A6ZEMV8WmdyOv4jvGuVvV2MLjU20RRmjXs6fJFmexBCrh455EGOQLNO9WDQTS-e4JwsxT8vKFCX6p2FaeZu_LkiD3ek0_7vjPbQbPU58txCRfbThhgeoWXdzwFG5D9F7qMUlg-AvWocHoP64cgClw8bz4IfTmN_Dniz_hmHDc_BUceAkEuvdcDxe8GQqGATfJzj51pNssf0YzUrsM8CuOkKvnYeX-0cS-zAQCwo6JZQXNDGCSyNTiKeUKKktmDZCplnfKWclA8S5dMqW_hYyKamzWosUJkinTXqMGsPR0J0grDIhHReOS1mCWbSFkBCPZcIknDrJdQvRGoTcxkfKfa-Mj3z1vLIHLgfg8gBcDnOulnPGiyc61o5u12jlUV0n-QqqFrqu8V79_nu10_WrnaEdFkTMc9LaqDGtZu4cbdv5dDCpLoKwfgNNdO-e
  priority: 102
  providerName: ProQuest
Title Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server
URI https://link.springer.com/article/10.1007/s10489-020-01681-9
https://www.proquest.com/docview/2428278110
Volume 50
WOSCitedRecordID wos000522011800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1573-7497
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003301
  issn: 0924-669X
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1ZSwMxEB68HnzxFo9a8uCbBvZINsmjSkUQS2k9qi9LNptqoVbZVn-_k3TXqqigsASWHISZTGYm-SYDsK9z1ME6M5Rn2lJmckl12FM0ylQWxb0o0DLzySZEsym7XdUqg8JGFdq9upL0O_WHYDfm4D2RA1IlMqRqFuZR3Uknju3O9fv-ix66z5OHngVNEtUtQ2W-H-OzOpramF-uRb22OV3-3zxXYKm0LsnRZDmswowdrsFylbmBlIK8Dg8-7pb2vW1oLOmjqJPCItss0Q7zPhyXZ3nEAePvCU7hFa1S4vGH1DiTmzxPMDEFNsLvEQ164wC1xAyeXnLiTnttsQFXp43LkzNa5lygBoVxTEOWhYHmTGgRo-8keR6aLFKaizjpWWmNiJC7TFhpcnfjGOShNUrxGDsIq3S8CXPDp6HdAiITLizjlgmRowo0GRfoeyVcByy0gqltCCvSp6Z8kNzlxRik06eUHSlTJGXqSZlin4P3Ps-T5zh-bV2rOJqWojlK0SaRkYuvDbbhsOLgtPrn0Xb-1nwXFiO_CBwerQZz4-LF7sGCeR33R0UdZsXNbR3mjxvNVhv_zgXF8iI4caXoYNnid3W_sN8AN97sVQ
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQXylMUCvgAJ7BIHDu2D1WFClWrlhWHIu0tOM4sXandXbLbIv4Uv5EZb9IVSPTWA1Jusa3E_jwPzzcegFehIR0c6ihNHVDq2DgZ8pGXqva1KkYqC65OxSbsYOCGQ_95DX71uTBMq-xlYhLUzTTyGfk7UiVOcVpktjP7LrlqFEdX-xIaS1gc4s8f5LLNtw8-0Pq-Vmrv4_HuvuyqCshIcFvIXNd5Foy2wRbkHTjT5LFWPhhblCN0GK2i79cWXWw4ppY1OUbvTUEdLPpQ0Lg34KbWtB2YKpjtXkr-okjlljPyaWRZ-mGXpNOl6mkmJymmgZUul_5PRbiybv8KyCY9t7fxv83QPbjbWdTi_XIL3Ic1nDyAjb5aheiE10M4SbnGcpzs4YhiTOJNtEhQRRGY5z9ZdOeXgpMBvgmaoAuyxEXiXMrIboaYLXlALTWi54ycmMgkYhFPp-eN4BNubB_Bl2v538ewPplO8AkIVxqL2qC2tiG1H2tjyd8sTch0jlb7Tcj7Ra9idwk71wI5rVbXRzNQKgJKlYBSUZ83l31myytIrmy91aOj6sTRvFpBYxPe9vhavf73aE-vHu0l3N4__nRUHR0MDp_BHZXgzfy7LVhftOf4HG7Fi8V43r5IG0XA1-vG3W8BOUsA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3Pb9MwFH4aA6FdtvFL2xjDBziBtcSxY_uAEGKrmIqqHUDqLTjOK1QabZd2m_jX-Ot4dp1VIG23HZByS2zJzuf3w_6eP4BXriEf7GrPVe2QS98Y7vKR5aK2tShGInOmjmITejAww6E9XYPfXS1MoFV2NjEa6mbqwx75IbkSI0JZZHY4SrSI06Pe-9k5DwpS4aS1k9NYQqSPv64ofZu_Ozmif_1aiN7xl4-feFIY4J6gt-C5rPPMKamdLihTMKrJfS2sU7ooR2jQa0FjkRqNb8L5Wtbk6K1VBTXQaF1B_d6D--SFVVhjfc2vvUBRROnljPIbXpZ2mAp2UtmeDEQlEShhpcm5_dspriLdfw5no8_rbf3Ps7UNmynSZh-WS-MRrOHkMWx1KhYsGbUn8CPWIPNxjJM9sjGZPdYiQRiZC_z_ySLta7JQJPCd0WRdUoTOIheT-5B-sNmSH9TSR_T8pOTGB3Ix82fTi4aFnW9sn8LXOxnvM1ifTCe4A8yUSqNUKLVuKBzwtdKUh5bKZTJHLe0u5B0AKp8uZw8aIWfV6lrpAJqKQFNF0FTU5s11m9nyapJbv97vkFIlMzWvVjDZhbcd1lavb-5t7_beXsJDglv1-WTQfw4bIiI90PL2YX3RXuALeOAvF-N5exDXDINvdw27P5D_U6Y
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Multi-instance+iris+remote+authentication+using+private+multi-class+perceptron+on+malicious+cloud+server&rft.jtitle=Applied+intelligence+%28Dordrecht%2C+Netherlands%29&rft.au=Morampudi%2C+Mahesh+Kumar&rft.au=Veldandi%2C+Sowmya&rft.au=Prasad%2C+Munaga+V.+N.+K.&rft.au=Raju%2C+U.+S.+N.&rft.date=2020-09-01&rft.issn=0924-669X&rft.eissn=1573-7497&rft.volume=50&rft.issue=9&rft.spage=2848&rft.epage=2866&rft_id=info:doi/10.1007%2Fs10489-020-01681-9&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10489_020_01681_9
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-669X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-669X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-669X&client=summon