Login / Signup
Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough?
Elena Pagnin
Jing Liu
Aikaterini Mitrokotsa
Published in:
CANS (2017)
Keyphrases
</>
authentication protocol
user authentication
smart card
security analysis
lightweight
public key
security protocols
rfid tags
secret key
multistage stochastic
privacy preserving
password authentication
rfid systems
hash functions
similarity measure
access control
feature extraction