Login / Signup

Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.

Siraj A. ShaikhChristos K. Dimitriadis
Published in: SPC (2006)
Keyphrases
  • authentication protocol
  • lightweight
  • user authentication
  • information systems
  • distributed systems
  • intrusion detection
  • computing environments
  • biometric systems