Y Huang, B Wang, X Pu, Y Li, Q Zhang - The Journal of Supercomputing, 2024 - Springer
Existing biohashing authentication schemes usually store bioinformation in the cloud, whose
storage method can face the problems of bioinformation leakage and tampering, and single …