Login / Signup
More efficient key-hash based fingerprint remote authentication scheme using mobile device.
Muhammad Khurram Khan
Saru Kumari
Mridul Kumar Gupta
Published in:
Computing (2014)
Keyphrases
</>
authentication scheme
mobile devices
real time
information systems
cost effective
data streams
user authentication