Author:
Sharma Shreyansh,Saini Anil,Chaudhury Santanu
Subject
Law,General Computer Science
Reference132 articles.
1. A privacy-aware continuous authentication scheme for proximity-based access control;Agudo;Comput. Secur.,2013
2. Power analysis of Atmel cryptomemory–recovering keys from secure eeproms;Balasch,2012
3. Two-factor identity authentication scheme based on blockchain and fuzzy extractor;Bao;Soft Comput.,2021
4. Secret-sharing schemes: a survey;Beimel,2011
5. Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective;Biggio;IEEE Signal Process. Mag.,2015