Login / Signup
How many interesting points should be used in a template attack?
Hailong Zhang
Yongbin Zhou
Published in:
J. Syst. Softw. (2016)
Keyphrases
</>
template matching
attack detection
data points
secret key
real time
case study
three dimensional
input image
multi view
feature points
keypoints
point sets