has been cited by the following article(s):
[1]
|
User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks
Entropy,
2017
DOI:10.3390/e19020070
|
|
|
[2]
|
Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2
Advances in Intelligent Systems and Computing,
2015
DOI:10.1007/978-3-319-13731-5_47
|
|
|
[3]
|
Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2
Advances in Intelligent Systems and Computing,
2015
DOI:10.1007/978-3-319-13731-5_47
|
|
|