Login / Signup
Personalised cryptographic key generation based on FaceHashing.
Andrew Teoh Beng Jin
David Ngo Chek Ling
Alwyn Goh
Published in:
Comput. Secur. (2004)
Keyphrases
</>
smart card
security protocols
hash functions
context aware
user modelling
user preferences
key management
digital signature
mobile learning
encryption scheme
real world
social networks
evolutionary algorithm
security properties
encryption key