Login / Signup
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table.
Sungju Lee
Daesung Moon
Seunghwan Jung
Yongwha Chung
Published in:
ICANNGA (2) (2007)
Keyphrases
</>
hash table
secret key
hash functions
smart card
data structure
access control
low cost
signature scheme
public key