Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication

In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; seco...

Full description

Bibliographic Details
Main Author: Yan, Weiwei
Format: Others
Language:English
Published: KTH, Skolan för informations- och kommunikationsteknik (ICT) 2011
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66677