Logo des Repositoriums
 

In what way is it possible to impersonate you bypassing fingerprint sensors?

dc.contributor.authorVibert, Benoit
dc.contributor.authorBars, Jeam-Marie Le
dc.contributor.authorCharrier, Christophe
dc.contributor.authorRosenberger, Christophe
dc.contributor.editorBrömme, Arslan
dc.contributor.editorBusch, Christoph
dc.contributor.editorRathgeb, Christian
dc.contributor.editorUhl, Andreas
dc.date.accessioned2017-06-21T11:33:52Z
dc.date.available2017-06-21T11:33:52Z
dc.date.issued2016
dc.identifier.isbn978-3-88579-654-1
dc.identifier.pissn1617-5468
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofBiosig 2016
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-260
dc.titleIn what way is it possible to impersonate you bypassing fingerprint sensors?en
dc.typeText/Conference Paper
gi.citation.endPage384
gi.citation.publisherPlaceBonn
gi.citation.startPage377
gi.conference.date21.-23. September 2016
gi.conference.locationDarmstadt

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
377.pdf
Größe:
3.8 MB
Format:
Adobe Portable Document Format