Login / Signup

Attribute-based Authentication Schemes: a Survey.

Huihui YangVladimir A. Oleshchuk
Published in: Int. J. Comput. (2015)
Keyphrases
  • biometric authentication
  • databases
  • identity management
  • fragile watermarking
  • database
  • feature extraction
  • authentication protocol
  • integrity verification