Biometrics identification system

For most system, their security relies on authentication methods that use information or token such as password, keys or cards to authorize their users’ access. While these methods are generally sufficient, unauthorized users can gain access once they acquire the required information or token. This...

詳細記述

書誌詳細
第一著者: Wong, Fu Qiang.
その他の著者: Li Fang
フォーマット: Final Year Project (FYP)
言語:English
出版事項: 2013
主題:
オンライン・アクセス:http://hdl.handle.net/10356/52273