Cited By
View all- Haasnoot ESpreeuwers LVeldhuis R(2022)Presentation attack detection and biometric recognition in a challenge-response formalismEURASIP Journal on Information Security10.1186/s13635-022-00131-y2022:1Online publication date: 5-Sep-2022
- Ekpezu AUmoh EKoranteng FAbandoh-Sam J(2020)Biometric Authentication Schemes and Methods on Mobile DevicesModern Theories and Practices for Cyber Ethics and Security Compliance10.4018/978-1-7998-3149-5.ch011(172-192)Online publication date: 2020
- Islam MAli MZubaer KSarmin SIslam MIslam BIslam ASadri A(2017)Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics2017 International Conference on Networking, Systems and Security (NSysS)10.1109/NSysS.2017.7885807(87-95)Online publication date: Jan-2017