Protocols Using Keys from Faulty Data

  • Authors:
  • David Wheeler

  • Affiliations:
  • -

  • Venue:
  • Revised Papers from the 9th International Workshop on Security Protocols
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Some methods are derived for making faultless keys from faulty data such as iris codes or other analog measurements.