Skip to main content

and
  1. No Access

    Article

    Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain

    Existing biohashing authentication schemes usually store bioinformation in the cloud, whose storage method can face the problems of bioinformation leakage and tampering, and single point of failure. To address...

    Yibo Huang, Bo Wang, **angrong Pu, Yian Li, Qiuyu Zhang in The Journal of Supercomputing (2024)