Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication.
Mauro CislaghiGeorge EleftherakisRoberto MazzilliFrancois MohierSara FerriValerio GiuffridaElisa NegroniPublished in: CISIS (2008)
Keyphrases
- biometric authentication
- soft computing methods
- user authentication
- soft computing
- biometric authentication systems
- biometric systems
- fault diagnosis
- communication systems
- authentication systems
- identity verification
- computational intelligence
- information sharing
- security analysis
- resource constrained
- authentication protocol
- security mechanisms
- machine learning
- security requirements
- intelligent systems
- image processing