CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Hi-index | 0.00 |
Some methods are derived for making faultless keys from faulty data such as iris codes or other analog measurements.