Login / Signup
Analysis of the attack potential in low cost spoofing of fingerprints.
Ines Goicoechea-Telleria
Judith Liu-Jimenez
Helga C. Quiros-Sandoval
Raul Sánchez-Reillo
Published in:
ICCST (2017)
Keyphrases
</>
low cost
quantitative analysis
data sets
database
machine learning
information systems
case study
secret key