Login / Signup
Construction of a secure two-factor user authentication system using fingerprint information and password.
Woong Go
Kwang-Woo Lee
Jin Kwak
Published in:
J. Intell. Manuf. (2014)
Keyphrases
</>
user authentication
real time
information sharing
information security
security analysis
security level
feature selection
high dimensional
low cost
security requirements
authentication protocol
authentication scheme
authentication systems