Sign in

Targeted impersonation as a tool for the detection of biometric system vulnerabilities.

John D. BustardJohn N. CarterMark S. Nixon
Published in: BTAS (2013)
Keyphrases