Login / Signup
A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
Takato Hirano
Takashi Ito
Yutaka Kawai
Nori Matsuda
Takumi Yamamoto
Tatsuji Munaka
Published in:
ISITA (2016)
Keyphrases
</>
authentication protocol
user authentication
smart card
biometric data
countermeasures
biometric systems
biometric template
security analysis
lightweight
power analysis
public key
information security
secret key
security protocols
rfid tags
iris images
feature extraction
iris recognition
hash functions
rfid systems