Login / Signup
Security evaluation of biometric keys.
Hisham Al-Assam
Sabah Jassim
Published in:
Comput. Secur. (2012)
Keyphrases
</>
biometric systems
biometric data
intrusion detection
fuzzy vault
database
evaluation method
user authentication
information security
neural network
feature extraction
relational databases
network security
security requirements