Login / Signup
Attribute-based Authentication Schemes: a Survey.
Huihui Yang
Vladimir A. Oleshchuk
Published in:
Int. J. Comput. (2015)
Keyphrases
</>
biometric authentication
databases
identity management
fragile watermarking
database
feature extraction
authentication protocol
integrity verification