Vulnerabilities of fuzzy vault schemes using biometric data with traces.
Autor: | Lafkih, Maryam, Lacharme, Patrick, Rosenberger, Christophe, Mikram, Mounia, Ghouzali, Sanaa, El Haziti, Mohammed, Aboutajdine, Driss |
---|---|
Zdroj: | 2015 IEEE 21st International Conference on Embedded & Real-Time Computing Systems & Applications; 2015, p822-827, 6p |
Databáze: | Complementary Index |
Externí odkaz: |