Biometric security from an information-theoretical perspective
From MaRDI portal
Publication:2903463
Recommendations
Cited in
(8)- Soft Generation of Secure Biometric Keys
- On the leakage of information in biometric authentication
- Current Challenges for IT Security with Focus on Biometry
- scientific article; zbMATH DE number 1424162 (Why is no real title available?)
- Binding cryptographic keys into biometric data: optimization
- Biometric quantization through detection rate optimized bit allocation
- Security with noisy data. Private biometrics, secure storage and anti-counterfeiting.
- When Are Fuzzy Extractors Possible?
This page was built for publication: Biometric security from an information-theoretical perspective
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2903463)