Login / Signup
Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates.
John H. Gerdes Jr.
Chin-Tser Huang
Mohamed A. Sharaf
Published in:
Electron. Commer. Res. (2017)
Keyphrases
</>
access control
public key
public key infrastructure
neural network
biometric authentication
identity verification
pattern recognition
digital libraries
key technologies
biometric recognition
personal authentication