<--- Back to Details
First PageDocument Content
Cryptography / Biometrics / Identification / Fingerprinting algorithms / Access control / Fingerprint / Human anatomy / Public key fingerprint / Naini / Authentication
Date: 2017-02-20 12:22:44
Cryptography
Biometrics
Identification
Fingerprinting algorithms
Access control
Fingerprint
Human anatomy
Public key fingerprint
Naini
Authentication

Private Fingerprint Matching Siamak F Shahandashti Reihaneh Safavi-Naini Philip Ogunbona Uni of Wollongong

Add to Reading List

Source URL: www-users.cs.york.ac.uk

Download Document from Source Website

File Size: 277,51 KB

Share Document on Facebook

Similar Documents

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

DocID: 1xVQY - View Document

CASE STUDY  VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY:	 Tatra Banka

CASE STUDY VOICE BIOMETRICS JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY: Tatra Banka

DocID: 1xUAY - View Document

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti  Marc Roeschlin

Broken Hearted: How To Attack ECG Biometrics Simon Eberz Nicola Paoletti Marc Roeschlin

DocID: 1xUjz - View Document

PDF Document

DocID: 1xSV6 - View Document

DOC Document

DocID: 1xMH5 - View Document