Login / Signup
Robust iris verification for key management.
Sheikh Ziauddin
Matthew N. Dailey
Published in:
Pattern Recognit. Lett. (2010)
Keyphrases
</>
key management
ad hoc networks
wireless sensor networks
resource constrained
key distribution
identity based cryptography
real time
multimedia
security threats
key management scheme
iris localization
low cost
communication networks
elliptic curve
secret sharing scheme