Login / Signup
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions.
Christos K. Dimitriadis
Siraj A. Shaikh
Published in:
Int. J. Netw. Secur. (2007)
Keyphrases
</>
authentication protocol
constraint satisfaction problems
feature extraction
computing environments
biometric systems
computer systems
user authentication
query processing