Cited By
View all- Zhang MMarin EOswald DSingelée D(2022)FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained DevicesSmart Card Research and Advanced Applications10.1007/978-3-030-97348-3_16(289-309)Online publication date: 9-Mar-2022
- Abidin AAly AMustafa M(2020)Collaborative Authentication Using Threshold CryptographyEmerging Technologies for Authorization and Authentication10.1007/978-3-030-39749-4_8(122-137)Online publication date: 25-Jan-2020
- Marin EArgones Rúa ESingelée DPreneel BKerschbaum FMashatan ANiu JLee A(2019)On the Difficulty of Using Patient's Physiological Signals in Cryptographic ProtocolsProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325099(113-122)Online publication date: 28-May-2019