Implementation of Fuzzy Vault biometric cryptosystem in Java
SpeechAuth: development of a biometric authentication and comand interpretation sy...
Side channel and invasive attacks on a secure code execution computer architecture
Efficient post-quantum cryptography for building advanced security applications
Deep representations for iris, face, and fingerprint spoofing detection
Visual cryptography using FPGA for authentication in online transactions