Biometrics Technology, Types & Applications
Biometric Authentication Systems
SECURITY OF INFORMATION Digital signatures Cryptography PKI Encryption RSA Algorithm Hash Function CYBERLAWS-Paper –I -LECTURE III Karnika.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Face Recognition Using SURF Interest Points