Login / Signup
Weaknesses of fingerprint-based mutual authentication protocol.
Pablo Picazo-Sanchez
Lara Ortiz-Martin
Pedro Peris-Lopez
Nasour Bagheri
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
authentication protocol
smart card
lightweight
public key
security analysis
user authentication
rfid systems
security protocols
rfid tags
mutual authentication
secret key
fingerprint images
hash functions
operating system
feature space
feature extraction
data distribution