Date: 2010-10-23 12:03:49Cryptography Biometrics Coding theory Fuzzy extractor Private biometrics Error detection and correction Password Public key fingerprint Cyclic redundancy check Cryptographic hash function Matching Key | | Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, COAdd to Reading ListSource URL: vast.uccs.eduDownload Document from Source Website File Size: 429,32 KBShare Document on Facebook
|