19
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Authentication based on wavelet transformations

&
Pages 513-521 | Received 01 Mar 2006, Published online: 03 Jun 2013

Bibliography

  • Abramovich , F. , Bailey , T. and Sapatinas , T. 2000 . Wavelet analysis and its statistical applications the statisticicen . Journal of the Royal Statistical Society, Series D , 48 : 1 – 30 .
  • Antoniadis , A. 1999 . Wavelets in statistics: a review . J. H. Statis. Soc. ,
  • Schneier , B. 1996 . Applied Cryptography: Protocols, Algorithms and Source Code in C , John Wiley and Sons .
  • Hershberger , E. and Kargrupta , H. 2001 . Distributed multivariate regression using waveletbased collective data mining . Journal of Parallel and Distributed computing , 61 ( 3 ) : 372 – 400 .
  • Ford , W. 1994 . Computer Communication Security , Prentice Hall .
  • Chaos , G. J. 1988 . Making a New Science , Minerva Limited .
  • Strang , G. 1992 . Wavelets and its Applications . American Scientist , 82 : 250 – 255 .
  • Daubechies , I. 1992 . Ten Lectures on Wavelet Transformations , Vermont : Capital City Press Montpelier .
  • Levi-dit-Vehel and Naccache . “ A class of one way functions necessary and sufficient for secure key agreement ” . In Proceedings of Eucrocrypt’96 in
  • Agarwal , R. , Gehrke , J. , Gunopulos , D. and Raghavan , P. Automatic subspace clustering for high dimensional data for data mining applications . Proceedings of ACM SIGMOD International Conference on Management of Data . Washington . June . pp. 94 – 105 . in
  • Mallat , S. 1989 . A theory for multiresolution signal decomposition: the wavelet representation . IEEE Transaction on pattern Analysis and Machine Intelligence , 11 ( 7 ) : 674 – 693 .
  • Diffe , W. and Hellman , M. 1976 . New directions in cryptography . IEEE Transaction on Information Theory , 22 ( 6 ) November : 644 – 654 .
  • Stallings , W. 2003 . Cryptography and Network Security Principles and Practices , 3rd , Pearson Education .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.