A Makrushin, T Scheidat, C Vielhauer - … , March 8-10, 2011. Proceedings 3, 2011 - Springer
Biometric cryptosystems extend the user authentication functionality of usual biometric
systems with the ability to generate robust stable values (also called biometric hashes) from …