Login / Signup
Collusive attack that exploits biometric similarity difference and basic countermeasures.
Pin Lyu
Wandong Cai
Yao Wang
Published in:
Wirel. Networks (2024)
Keyphrases
</>
countermeasures
information security
power analysis
similarity measure
cyber attacks
java card
match scores
rural areas
security measures
databases
user authentication
biometric authentication
differential power analysis
operating system
iris recognition
intrusion detection
personal identification
e government