Login / Signup
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
Ines Goicoechea-Telleria
Raul Sánchez-Reillo
Judith Liu-Jimenez
Ramon Blanco-Gonzalo
Published in:
Wirel. Commun. Mob. Comput. (2018)
Keyphrases
</>
sensor data
sensor networks
countermeasures
real time
data sets
evaluation criteria
evaluation model
mobile devices
daily life
physical world
fingerprint identification
fingerprint authentication