Answer Posted / deepa
those are technics like
face detection
Iris recognition
fingerprint recognition
palm vien recognition.
All these can be used for Authentication
| Is This Answer Correct ? | 7 Yes | 1 No |
Post New Answer View All Answers
Is DSS secure?
What are the best discrete logarithm methods in use today ?
What are CAPIs ?
What is the role of the United States government in cryptography ?
What is iKP ?
What are the best factoring methods in use today ?
Who issues certificates and how?
What is the NSA ?
Can rsa be exported from the united states?
What are lattice-based cryptosystems ?
How do elliptic curve cryptosystems compare with other cryptosystems ?
What are elliptic curve cryptosystems ?
What is Fortezza ?
What is a birthday attack?
What is blowfish?