Login / Signup

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

Ines Goicoechea-TelleriaRaul Sánchez-ReilloJudith Liu-JimenezRamon Blanco-Gonzalo
Published in: Wirel. Commun. Mob. Comput. (2018)
Keyphrases
  • sensor data
  • sensor networks
  • countermeasures
  • real time
  • data sets
  • evaluation criteria
  • evaluation model
  • mobile devices
  • daily life
  • physical world
  • fingerprint identification
  • fingerprint authentication