{"title":"信息管理应用中的仿生密码技术","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/AINA.2016.161","DOIUrl":null,"url":null,"abstract":"This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data classification solutions. The process of data classification will be possible owing to the use of cryptographic techniques of sharing information, enriched by elements of biometric processes of personal identification. This type of solutions will serve to support the processes of managing strategic information.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"23 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"39","resultStr":"{\"title\":\"Bio-Inspired Cryptographic Techniques in Information Management Applications\",\"authors\":\"L. Ogiela, M. Ogiela\",\"doi\":\"10.1109/AINA.2016.161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data classification solutions. The process of data classification will be possible owing to the use of cryptographic techniques of sharing information, enriched by elements of biometric processes of personal identification. This type of solutions will serve to support the processes of managing strategic information.\",\"PeriodicalId\":438655,\"journal\":{\"name\":\"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)\",\"volume\":\"23 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"39\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINA.2016.161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2016.161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bio-Inspired Cryptographic Techniques in Information Management Applications
This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data classification solutions. The process of data classification will be possible owing to the use of cryptographic techniques of sharing information, enriched by elements of biometric processes of personal identification. This type of solutions will serve to support the processes of managing strategic information.