Serge Vaudenay, Loïs Evan Huguenin-Dumittan, Fatma Betül Durak
We design a consecution of protocols which allows organizations to have secure strong access control of their users to their desktop machines based on biometry. It provides both strong secure authentication and privacy. Moreover, our mechanism allows the s ...
Springer, Cham2020