Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT Article Swipe
YOU?
·
· 2018
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.1803.09710
With the emergence of the Internet-of-Things (IoT), there is a growing need for access control and data protection on low-power, pervasive devices. Biometric-based authentication is promising for IoT due to its convenient nature and lower susceptibility to attacks. However, the costs associated with biometric processing and template protection are nontrivial for smart cards, key fobs, and so forth. In this paper, we discuss the security, cost, and utility of biometric systems and develop two major frameworks for improving them. First, we introduce a new framework for implementing biometric systems based on physical unclonable functions (PUFs) and hardware obfuscation that, unlike traditional software approaches, does not require nonvolatile storage of a biometric template/key. Aside from reducing the risk of compromising the biometric, the nature of obfuscation also provides protection against access control circumvention via malware and fault injection. The PUF provides non-invertibility and non-linkability. Second, a major requirement of the proposed PUF/obfuscation approach is that a reliable (robust) key be generated from the users input biometric. We propose a noiseaware biometric quantization framework capable of generating unique, reliable keys with reduced enrollment time and denoising costs. Finally, we conduct several case studies. In the first, the proposed noise-aware approach is compared to our previous approach for multiple biometric modalities, including popular ones (fingerprint and iris) and emerging cardiovascular ones (ECG and PPG). The results show that ECG provides the best tradeoff between reliability, key length, entropy, and cost. In the second and third case studies, we demonstrate how reliability, denoising costs, and enrollment times can be simultaneously improved by modeling subject intra-variations for ECG.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/1803.09710
- https://arxiv.org/pdf/1803.09710
- OA Status
- green
- Cited By
- 15
- References
- 22
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2795140821
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2795140821Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.1803.09710Digital Object Identifier
- Title
-
Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoTWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2018Year of publication
- Publication date
-
2018-03-26Full publication date if available
- Authors
-
Nima Karimian, Zimu Guo, Fatemeh Tehranipoor, Damon L. Woodard, Mark Tehranipoor, Domenic ForteList of authors in order
- Landing page
-
https://arxiv.org/abs/1803.09710Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/1803.09710Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/1803.09710Direct OA link when available
- Concepts
-
Biometrics, Computer science, Obfuscation, Computer security, Key (lock), Access control, Embedded systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
15Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 2, 2023: 1, 2022: 1, 2021: 1, 2020: 6Per-year citation counts (last 5 years)
- References (count)
-
22Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2795140821 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.1803.09710 |
| ids.doi | https://doi.org/10.48550/arxiv.1803.09710 |
| ids.mag | 2795140821 |
| ids.openalex | https://openalex.org/W2795140821 |
| fwci | |
| type | preprint |
| title | Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12122 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1708 |
| topics[0].subfield.display_name | Hardware and Architecture |
| topics[0].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[1].id | https://openalex.org/T10828 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9972000122070312 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Biometric Identification and Security |
| topics[2].id | https://openalex.org/T11800 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9932000041007996 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | User Authentication and Security Systems |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C184297639 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8565675020217896 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q177765 |
| concepts[0].display_name | Biometrics |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7871520519256592 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C40305131 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6754366755485535 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q2616305 |
| concepts[2].display_name | Obfuscation |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5463278293609619 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C26517878 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5459848642349243 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[4].display_name | Key (lock) |
| concepts[5].id | https://openalex.org/C527821871 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5324370265007019 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q228502 |
| concepts[5].display_name | Access control |
| concepts[6].id | https://openalex.org/C149635348 |
| concepts[6].level | 1 |
| concepts[6].score | 0.3899986147880554 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[6].display_name | Embedded system |
| keywords[0].id | https://openalex.org/keywords/biometrics |
| keywords[0].score | 0.8565675020217896 |
| keywords[0].display_name | Biometrics |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7871520519256592 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/obfuscation |
| keywords[2].score | 0.6754366755485535 |
| keywords[2].display_name | Obfuscation |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.5463278293609619 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/key |
| keywords[4].score | 0.5459848642349243 |
| keywords[4].display_name | Key (lock) |
| keywords[5].id | https://openalex.org/keywords/access-control |
| keywords[5].score | 0.5324370265007019 |
| keywords[5].display_name | Access control |
| keywords[6].id | https://openalex.org/keywords/embedded-system |
| keywords[6].score | 0.3899986147880554 |
| keywords[6].display_name | Embedded system |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:1803.09710 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/1803.09710 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/1803.09710 |
| locations[1].id | doi:10.48550/arxiv.1803.09710 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.1803.09710 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5014914538 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-4590-7170 |
| authorships[0].author.display_name | Nima Karimian |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Nima Karimian |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5100747200 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3630-743X |
| authorships[1].author.display_name | Zimu Guo |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Zimu Guo |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5103273702 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5742-9954 |
| authorships[2].author.display_name | Fatemeh Tehranipoor |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Fatemeh Tehranipoor |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5055751228 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-0471-177X |
| authorships[3].author.display_name | Damon L. Woodard |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Damon L. Woodard |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5102766705 |
| authorships[4].author.orcid | https://orcid.org/0009-0006-8410-2347 |
| authorships[4].author.display_name | Mark Tehranipoor |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Mark M. Tehranipoor |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5009243659 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-2794-7320 |
| authorships[5].author.display_name | Domenic Forte |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Domenic Forte |
| authorships[5].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/1803.09710 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T12122 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1708 |
| primary_topic.subfield.display_name | Hardware and Architecture |
| primary_topic.display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| related_works | https://openalex.org/W4224216661, https://openalex.org/W3210347767, https://openalex.org/W2066014542, https://openalex.org/W67940504, https://openalex.org/W2024170198, https://openalex.org/W2152144666, https://openalex.org/W1819617256, https://openalex.org/W4308699695, https://openalex.org/W2596984206, https://openalex.org/W1507511632 |
| cited_by_count | 15 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2023 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2022 |
| counts_by_year[2].cited_by_count | 1 |
| counts_by_year[3].year | 2021 |
| counts_by_year[3].cited_by_count | 1 |
| counts_by_year[4].year | 2020 |
| counts_by_year[4].cited_by_count | 6 |
| counts_by_year[5].year | 2019 |
| counts_by_year[5].cited_by_count | 4 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:1803.09710 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/1803.09710 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/1803.09710 |
| primary_location.id | pmh:oai:arXiv.org:1803.09710 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/1803.09710 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/1803.09710 |
| publication_date | 2018-03-26 |
| publication_year | 2018 |
| referenced_works | https://openalex.org/W1887546054, https://openalex.org/W2032843510, https://openalex.org/W2132904166, https://openalex.org/W1524250393, https://openalex.org/W2516218154, https://openalex.org/W2135211381, https://openalex.org/W2063355793, https://openalex.org/W2124106073, https://openalex.org/W2265356345, https://openalex.org/W2566491692, https://openalex.org/W2142537526, https://openalex.org/W2116374153, https://openalex.org/W156132949, https://openalex.org/W2623572935, https://openalex.org/W601292485, https://openalex.org/W2115156609, https://openalex.org/W2086544244, https://openalex.org/W2000171858, https://openalex.org/W2080284304, https://openalex.org/W2483049553, https://openalex.org/W1566796882, https://openalex.org/W2020617455 |
| referenced_works_count | 22 |
| abstract_inverted_index.a | 9, 82, 109, 144, 154, 167 |
| abstract_inverted_index.In | 58, 191, 237 |
| abstract_inverted_index.We | 165 |
| abstract_inverted_index.be | 158, 254 |
| abstract_inverted_index.by | 257 |
| abstract_inverted_index.is | 8, 24, 152, 198 |
| abstract_inverted_index.of | 3, 68, 108, 117, 123, 147, 173 |
| abstract_inverted_index.on | 18, 90 |
| abstract_inverted_index.so | 56 |
| abstract_inverted_index.to | 29, 36, 200 |
| abstract_inverted_index.we | 61, 80, 186, 244 |
| abstract_inverted_index.ECG | 225 |
| abstract_inverted_index.IoT | 27 |
| abstract_inverted_index.PUF | 138 |
| abstract_inverted_index.The | 137, 221 |
| abstract_inverted_index.and | 15, 33, 45, 55, 66, 71, 95, 134, 141, 182, 212, 214, 219, 235, 240, 250 |
| abstract_inverted_index.are | 48 |
| abstract_inverted_index.can | 253 |
| abstract_inverted_index.due | 28 |
| abstract_inverted_index.for | 12, 26, 50, 76, 85, 204, 261 |
| abstract_inverted_index.how | 246 |
| abstract_inverted_index.its | 30 |
| abstract_inverted_index.key | 53, 157, 232 |
| abstract_inverted_index.new | 83 |
| abstract_inverted_index.not | 104 |
| abstract_inverted_index.our | 201 |
| abstract_inverted_index.the | 1, 4, 39, 63, 115, 119, 121, 148, 161, 192, 194, 227, 238 |
| abstract_inverted_index.two | 73 |
| abstract_inverted_index.via | 132 |
| abstract_inverted_index.(ECG | 218 |
| abstract_inverted_index.ECG. | 262 |
| abstract_inverted_index.With | 0 |
| abstract_inverted_index.also | 125 |
| abstract_inverted_index.best | 228 |
| abstract_inverted_index.case | 189, 242 |
| abstract_inverted_index.data | 16 |
| abstract_inverted_index.does | 103 |
| abstract_inverted_index.from | 113, 160 |
| abstract_inverted_index.keys | 177 |
| abstract_inverted_index.need | 11 |
| abstract_inverted_index.ones | 210, 217 |
| abstract_inverted_index.risk | 116 |
| abstract_inverted_index.show | 223 |
| abstract_inverted_index.that | 153, 224 |
| abstract_inverted_index.this | 59 |
| abstract_inverted_index.time | 181 |
| abstract_inverted_index.with | 42, 178 |
| abstract_inverted_index.Aside | 112 |
| abstract_inverted_index.PPG). | 220 |
| abstract_inverted_index.based | 89 |
| abstract_inverted_index.cost, | 65 |
| abstract_inverted_index.cost. | 236 |
| abstract_inverted_index.costs | 40 |
| abstract_inverted_index.fault | 135 |
| abstract_inverted_index.fobs, | 54 |
| abstract_inverted_index.input | 163 |
| abstract_inverted_index.iris) | 213 |
| abstract_inverted_index.lower | 34 |
| abstract_inverted_index.major | 74, 145 |
| abstract_inverted_index.smart | 51 |
| abstract_inverted_index.that, | 98 |
| abstract_inverted_index.them. | 78 |
| abstract_inverted_index.there | 7 |
| abstract_inverted_index.third | 241 |
| abstract_inverted_index.times | 252 |
| abstract_inverted_index.users | 162 |
| abstract_inverted_index.(IoT), | 6 |
| abstract_inverted_index.(PUFs) | 94 |
| abstract_inverted_index.First, | 79 |
| abstract_inverted_index.access | 13, 129 |
| abstract_inverted_index.cards, | 52 |
| abstract_inverted_index.costs, | 249 |
| abstract_inverted_index.costs. | 184 |
| abstract_inverted_index.first, | 193 |
| abstract_inverted_index.forth. | 57 |
| abstract_inverted_index.nature | 32, 122 |
| abstract_inverted_index.paper, | 60 |
| abstract_inverted_index.second | 239 |
| abstract_inverted_index.unlike | 99 |
| abstract_inverted_index.Second, | 143 |
| abstract_inverted_index.against | 128 |
| abstract_inverted_index.between | 230 |
| abstract_inverted_index.capable | 172 |
| abstract_inverted_index.conduct | 187 |
| abstract_inverted_index.control | 14, 130 |
| abstract_inverted_index.develop | 72 |
| abstract_inverted_index.discuss | 62 |
| abstract_inverted_index.growing | 10 |
| abstract_inverted_index.length, | 233 |
| abstract_inverted_index.malware | 133 |
| abstract_inverted_index.popular | 209 |
| abstract_inverted_index.propose | 166 |
| abstract_inverted_index.reduced | 179 |
| abstract_inverted_index.require | 105 |
| abstract_inverted_index.results | 222 |
| abstract_inverted_index.several | 188 |
| abstract_inverted_index.storage | 107 |
| abstract_inverted_index.subject | 259 |
| abstract_inverted_index.systems | 70, 88 |
| abstract_inverted_index.unique, | 175 |
| abstract_inverted_index.utility | 67 |
| abstract_inverted_index.(robust) | 156 |
| abstract_inverted_index.Finally, | 185 |
| abstract_inverted_index.However, | 38 |
| abstract_inverted_index.approach | 151, 197, 203 |
| abstract_inverted_index.attacks. | 37 |
| abstract_inverted_index.compared | 199 |
| abstract_inverted_index.devices. | 21 |
| abstract_inverted_index.emerging | 215 |
| abstract_inverted_index.entropy, | 234 |
| abstract_inverted_index.hardware | 96 |
| abstract_inverted_index.improved | 256 |
| abstract_inverted_index.modeling | 258 |
| abstract_inverted_index.multiple | 205 |
| abstract_inverted_index.physical | 91 |
| abstract_inverted_index.previous | 202 |
| abstract_inverted_index.proposed | 149, 195 |
| abstract_inverted_index.provides | 126, 139, 226 |
| abstract_inverted_index.reducing | 114 |
| abstract_inverted_index.reliable | 155, 176 |
| abstract_inverted_index.software | 101 |
| abstract_inverted_index.studies, | 243 |
| abstract_inverted_index.studies. | 190 |
| abstract_inverted_index.template | 46 |
| abstract_inverted_index.tradeoff | 229 |
| abstract_inverted_index.biometric | 43, 69, 87, 110, 169, 206 |
| abstract_inverted_index.denoising | 183, 248 |
| abstract_inverted_index.emergence | 2 |
| abstract_inverted_index.framework | 84, 171 |
| abstract_inverted_index.functions | 93 |
| abstract_inverted_index.generated | 159 |
| abstract_inverted_index.improving | 77 |
| abstract_inverted_index.including | 208 |
| abstract_inverted_index.introduce | 81 |
| abstract_inverted_index.pervasive | 20 |
| abstract_inverted_index.promising | 25 |
| abstract_inverted_index.security, | 64 |
| abstract_inverted_index.associated | 41 |
| abstract_inverted_index.biometric, | 120 |
| abstract_inverted_index.biometric. | 164 |
| abstract_inverted_index.convenient | 31 |
| abstract_inverted_index.enrollment | 180, 251 |
| abstract_inverted_index.frameworks | 75 |
| abstract_inverted_index.generating | 174 |
| abstract_inverted_index.injection. | 136 |
| abstract_inverted_index.low-power, | 19 |
| abstract_inverted_index.noiseaware | 168 |
| abstract_inverted_index.nontrivial | 49 |
| abstract_inverted_index.processing | 44 |
| abstract_inverted_index.protection | 17, 47, 127 |
| abstract_inverted_index.unclonable | 92 |
| abstract_inverted_index.approaches, | 102 |
| abstract_inverted_index.demonstrate | 245 |
| abstract_inverted_index.modalities, | 207 |
| abstract_inverted_index.noise-aware | 196 |
| abstract_inverted_index.nonvolatile | 106 |
| abstract_inverted_index.obfuscation | 97, 124 |
| abstract_inverted_index.requirement | 146 |
| abstract_inverted_index.traditional | 100 |
| abstract_inverted_index.(fingerprint | 211 |
| abstract_inverted_index.compromising | 118 |
| abstract_inverted_index.implementing | 86 |
| abstract_inverted_index.quantization | 170 |
| abstract_inverted_index.reliability, | 231, 247 |
| abstract_inverted_index.circumvention | 131 |
| abstract_inverted_index.template/key. | 111 |
| abstract_inverted_index.authentication | 23 |
| abstract_inverted_index.cardiovascular | 216 |
| abstract_inverted_index.simultaneously | 255 |
| abstract_inverted_index.susceptibility | 35 |
| abstract_inverted_index.Biometric-based | 22 |
| abstract_inverted_index.PUF/obfuscation | 150 |
| abstract_inverted_index.intra-variations | 260 |
| abstract_inverted_index.non-linkability. | 142 |
| abstract_inverted_index.non-invertibility | 140 |
| abstract_inverted_index.Internet-of-Things | 5 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile |