11
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Financial Cryptography and Data Security 

      Secure Biometric Authentication for Weak Computational Devices

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references16

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            A fuzzy commitment scheme

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              On-line fingerprint verification

                Bookmark

                Author and book information

                Book Chapter
                2005
                : 357-371
                10.1007/11507840_32
                b1310356-499b-48d1-b8af-6fa9f3f5946b
                History

                Comments

                Comment on this book