![Biometrics / Cryptography / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key Biometrics / Cryptography / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key](https://www.pdfsearch.io/img/9aa65faf51918cf8a42061da4dc1e480.jpg) Date: 2010-10-23 12:03:49Biometrics Cryptography Coding theory Fuzzy extractor Private biometrics Error detection and correction Password Public key fingerprint Cyclic redundancy check Cryptographic hash function Matching Key | | Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, COAdd to Reading ListSource URL: www.vast.uccs.eduDownload Document from Source Website File Size: 429,32 KBShare Document on Facebook
|