A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
An Investigation on Biometric Internet Security International Journal of Network Security
Some measurement are identified and discussed for the challenges. Biometric recognition is discussed in detail wit pros and cons of the approach as a key e-security solution. ... Due to the Internet revolution in the last decade, each and every work area of society are directly or indirectly depending on computers, highly integrated computer networks and communication systems, ... The authors gratefully acknowledge the reviewers for their valuable suggestions. ...fatcat:c2q6cwnb6vapbixa3b4ublzf3a
International Journal of Network Security
In 2012, Zhang and Mao first designed the certificateless-based signature scheme based on RSA operations; however, their scheme still has latent vulnerabilities. ... Besides, we reduce the computational cost to make our scheme more efficient. ... The authors gratefully acknowledge the reviewers for their valuable comments. ...fatcat:u6ux7gsrj5efxp3xc4y2gpmahu