Enhancing security by combining biometrics and cryptography.
Diana PopaEmil SimionPublished in: ECAI (2017)
Keyphrases
- information security
- biometric data
- biometric systems
- fuzzy vault
- cryptographic algorithms
- pattern recognition
- encryption algorithms
- security requirements
- access control
- biometric template
- border control
- security level
- security issues
- computer security
- security analysis
- security systems
- authentication systems
- elliptic curve cryptography
- network security
- factor authentication
- intrusion detection
- iris recognition
- high security
- public key cryptography
- security policies
- biometric identification
- anomaly detection
- cellular automata
- key management
- biometric authentication
- cryptographic protocols
- homeland security