@dblp

Secure Biometric Authentication for Weak Computational Devices.

, , , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 357-371. Springer, (2005)

Links and resources

Tags