Login / Signup

Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol.

Thi Ai Thao NguyenTran Khanh Dang
Published in: Trans. Large Scale Data Knowl. Centered Syst. (2017)
Keyphrases
  • authentication protocol
  • real time
  • dimensionality reduction
  • smart card
  • distributed environment
  • secret key