Biometrics
iris scanning seminar report
Voice
Peer-to-peer and agent-based computing Security in Distributed Systems.
Towards Application Security Design | Process | Organization –Software Development Process –Security Design Process & Artifacts –Security Team composition.
Build and Operate Your Own Certificate Management Center of Mediocrity
High protection ATM system with fingerprint identification technology
ppt on Biometrics
BCC 2003 - Reintroducing Watchlist Statistics
BowyerHollingsworthFlynnCVIU_2007.pdf
Examining Intra-Visit Iris Stability - Visit 6