A covert authentication and security solution for GMOs.
Siguna MüllerFarhad JafariDon RothPublished in: BMC Bioinform. (2016)
Keyphrases
- identity authentication
- information flow
- information security
- security requirements
- security mechanisms
- data encryption
- security analysis
- high security
- intrusion detection
- integrity verification
- fuzzy vault
- authentication mechanism
- identity management
- biometric data
- user authentication
- authentication protocol
- network security
- authentication scheme
- security systems
- encryption decryption
- statistical databases
- access control
- password authentication