Subject
Law,General Computer Science
Reference56 articles.
1. Achieving non-transferability in credential systems using hidden biometrics;Adams;Secur. Commun. Netw.,2011
2. Pseudoentropic isometries: a new framework for fuzzy extractor reusability;Alamélou,2018
3. Fingerprint matching, spoof and liveness detection: classification and literature review;Ali;Front. Comput. Sci.,2021
4. Fuzzy extractors for minutiae-based fingerprint authentication;Arakala,2007
5. Recovering lost device-bound credentials;Baldimtsi,2015
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献