The vulnerabilities analysis of fuzzy vault using password

  • Sumin Hong*
  • , Woongryul Jeon
  • , Seungjoo Kim
  • , Dongho Won
  • , Choonsik Park
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fingerprint

Dive into the research topics of 'The vulnerabilities analysis of fuzzy vault using password'. Together they form a unique fingerprint.
Sort by

Keyphrases

Computer Science