Login / Signup

Permutation-based biometric authentication protocols for mitigating replay attacks.

Joseph SheltonGerry V. DozierJoshua AdamsAniesha Alford
Published in: IEEE Congress on Evolutionary Computation (2012)
Keyphrases