Current Challenges for IT Security with Focus on Biometry
From MaRDI portal
Publication:2790446
DOI10.1007/978-3-319-18275-9_21zbMath1368.94149OpenAlexW2336004963MaRDI QIDQ2790446
Preda Mihaĭlescu, Benjamin Tams, Michael Th. Rassias
Publication date: 4 March 2016
Published in: Computation, Cryptography, and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-18275-9_21
biometrycryptographyIT securitybiometric hashfuzzy commitment schemefuzzy vault schemeslow-down function
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Cites Work