Login / Signup
Protecting Biometrics Using Fuzzy Extractor and Non-invertible Transformation Methods in Kerberos Authentication Protocol.
Thi Ai Thao Nguyen
Tran Khanh Dang
Published in:
Trans. Large Scale Data Knowl. Centered Syst. (2017)
Keyphrases
</>
authentication protocol
real time
dimensionality reduction
smart card
distributed environment
secret key