Login / Signup
Permutation-based biometric authentication protocols for mitigating replay attacks.
Joseph Shelton
Gerry V. Dozier
Joshua Adams
Aniesha Alford
Published in:
IEEE Congress on Evolutionary Computation (2012)
Keyphrases
</>
biometric authentication
biometric template
security protocols
cryptographic protocols
biometric authentication systems
biometric systems
identity verification
user authentication
authentication protocol
security mechanisms
biometric data
match scores
authentication systems