Login / Signup
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification.
Liang Li
Jie Tian
Xin Yang
Published in:
WISI (2006)
Keyphrases
</>
third party
identity authentication
fingerprint verification
fingerprint recognition
data protection
mobile commerce
sensitive information
personal identification
personal information
personal data
fingerprint images
fusion scheme
network security
fingerprint matching
private information
mobile devices