Secure pairing with biometrics.
Ileana BuhanBas BoomJeroen DoumenPieter H. HartelRaymond N. J. VeldhuisPublished in: Int. J. Secur. Networks (2009)
Keyphrases
- factor authentication
- pattern recognition
- biometric authentication
- human identification
- standard model
- personal authentication
- authentication scheme
- user authentication
- security protocols
- security requirements
- biometric systems
- security issues
- iris recognition
- data sets
- facial recognition
- identity verification
- palmprint
- digital signature
- security mechanisms
- lightweight
- security level
- information technology
- feature extraction
- biometric data
- database
- key exchange protocol
- covert channel
- information systems