36
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Computer Security – ESORICS 2011 

      Secure and Efficient Protocols for Iris and Fingerprint Identification

      other
      ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references25

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            How to generate and exchange secrets

            Andrew Yao (1986)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              How Iris Recognition Works

              J Daugman (2004)
                Bookmark

                Author and book information

                Book Chapter
                2011
                : 190-209
                10.1007/978-3-642-23822-2_11
                90565c97-ab1a-4084-8d60-c5c3a7bdbff8

                http://www.springer.com/tdm

                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,431

                Cited by11