Secure and verifiable outsourcing of large-scale biometric computations.
Marina BlantonYihua ZhangKeith B. FrikkenPublished in: ACM Trans. Inf. Syst. Secur. (2013)
Keyphrases
- user authentication
- secret sharing
- pattern recognition
- information technology
- small scale
- real world
- real life
- security issues
- information systems
- sufficient conditions
- biometric systems
- biometric identification
- identity management
- security requirements
- palmprint
- neural network
- security analysis
- authentication protocol
- business process
- authentication scheme
- biometric authentication
- service providers
- feature extraction
- identity verification