Login / Signup
Time-Bound Anonymous Authentication for Roaming Networks.
Joseph K. Liu
Cheng-Kang Chu
Sherman S. M. Chow
Xinyi Huang
Man Ho Au
Jianying Zhou
Published in:
IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
</>
upper bound
network analysis
lower bound
worst case
network structure
error bounds
user authentication
biometric authentication
objective function
routing protocol
complex networks
computer networks
biometric data