Login / Signup

More efficient key-hash based fingerprint remote authentication scheme using mobile device.

Muhammad Khurram KhanSaru KumariMridul Kumar Gupta
Published in: Computing (2014)
Keyphrases
  • authentication scheme
  • mobile devices
  • real time
  • information systems
  • cost effective
  • data streams
  • user authentication