Published inTradeshift EngineeringBiometric spoofing at Ladies in SecurityA presentation on the viability of implementing a keyless PKI system that uses fingerprint and iris to derive the key.Apr 9, 2019Apr 9, 2019