[1]
International Biometrics Group: Biometrics Market Report 2009-2014, (2009).
Google Scholar
[2]
D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar in: Handbook of Fingerprint Recognition, Springer, New York, (2003) pp.8-12.
Google Scholar
[3]
W.F. Leung, S.H. Leung, W.H. Lau and A. Luk in: Fingerprint Recognition Using Neural Network, Neural Networks for Signal Processing, Proceedings of The 1991 IEEE Workshop (1991).
DOI: 10.1109/nnsp.1991.239519
Google Scholar
[4]
J.H. Wegstein in: An Automated Fingerprint Identification System, U.S. Government Publication, Washington, DC: U.S. Dept. of Commerce, National Bureau of Standards (1982).
Google Scholar
[5]
D. Maltoni in: A Tutorial on Fingerprint Recognition, Biometric Systems Laboratory - DEIS - University of Bologna (2005).
Google Scholar
[6]
K. Abbad, N. Assem, H. Tairi and A. Aarab in: Fingerprint Matching Relying on Minutiae Hough Clusters, ICGST - GVIP Journal, ISSN: 1687-398X, Volume 10, Issue 1, (2010) pp.39-44.
Google Scholar
[7]
Y. Chen and A.K. Jain in: Dots and incipients: Extended features for partial fingerprint matching, Biometric Symposium, BCC, Baltimore (2007).
DOI: 10.1109/bcc.2007.4430538
Google Scholar
[8]
R.S. Sandhu and P. Samarati in: Access Control: Principle and Practice, Communications Magazine, IEEE, Volume: 32, Issue: 9, (1994) pp.40-48.
DOI: 10.1109/35.312842
Google Scholar
[9]
T. Ritter, R. Schreiner, and U. Lang in: Integrating Security Policies via Container Portable Interceptors, Distributed Systems Online, IEEE, Volume: 7, Issue: 7 (2006).
DOI: 10.1109/mdso.2006.44
Google Scholar
[10]
V. Mureşan in: Mathematical Modelling and Numerical Simulation of the Temperature Control System in a Furnace with Rotary Hearth. IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics (ICCC-CONTI 2010), ISBN: 978-1-4244- -7431-8 (2010).
DOI: 10.1109/icccyb.2010.5491298
Google Scholar