Login / Signup

Vulnerabilities of fuzzy vault schemes using biometric data with traces.

Maryam LafkihPatrick LacharmeChristophe RosenbergerMounia MikramSanaa GhouzaliMohamed El HazitiDriss Aboutajdine
Published in: IWCMC (2015)
Keyphrases