K Simoens, J Bringer, H Chabanne, S Seys - IEEE Transactions on …, 2012 - infona.pl
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols
with respect to user and data privacy. The goal of an adversary in such context is not to …