2018 IEEE 4th International Symposium on Wireless Systems Within the International Conferences on Intelligent Data Acquisition 2018
DOI: 10.1109/idaacs-sws.2018.8525678
|View full text |Cite
|
Sign up to set email alerts
|

Security Systems with Biometry based on Partial View Facial Images Using Geometrical Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…However, these protocols also introduce some communication costs and may require some level of coordination between untrusting parties. [18]- [20] Zero-knowledge proofs are cryptographic procedures which let one party to prove to the other party that he knows particular knowledge without need to reveal the knowledge items. It allows performing authentication and verification procedures without the need to transmit any sensitive data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, these protocols also introduce some communication costs and may require some level of coordination between untrusting parties. [18]- [20] Zero-knowledge proofs are cryptographic procedures which let one party to prove to the other party that he knows particular knowledge without need to reveal the knowledge items. It allows performing authentication and verification procedures without the need to transmit any sensitive data.…”
Section: Literature Reviewmentioning
confidence: 99%