Skip to main content

Biometrics in an Adversarial Environment: Security and Privacy - Part 2 of 2