-
1
Secure Biometric Verification in the Presence of Malicious Adversaries
Published 2025-01-01Subjects: Get full text
Article -
2
Threshold ring signature for wireless sensor networks
Published 2012-03-01Subjects: Get full text
Article