Hardware security meets biometrics for the age of IoT.
Zimu GuoNima KarimianMark M. TehranipoorDomenic FortePublished in: ISCAS (2016)
Keyphrases
- security problems
- biometric data
- fuzzy vault
- biometric systems
- information security
- biometric template
- random number generator
- key management
- hardware and software
- factor authentication
- management system
- low cost
- access control
- security requirements
- real time
- protection scheme
- border control
- security issues
- computer systems
- security systems
- location information
- intrusion detection
- smart card
- embedded systems
- pattern recognition
- security policies
- data security
- security level
- network security
- trusted computing
- authentication systems
- biometric recognition
- cloud computing
- identity verification
- statistical databases
- rfid systems
- security protocols
- computing systems