Login / Signup
Cryptanalysis of log-in authentication based on circle property.
Fuw-Yi Yang
Jinn-Ke Jan
Published in:
IEEE Trans. Consumer Electron. (2004)
Keyphrases
</>
cross section
biometric authentication
information systems
hash functions
neural network
information retrieval
genetic algorithm
social networks
similarity measure
simulated annealing
hough transform
secret key
scatter search
biometric data