Answer Posted / deepa
those are technics like
face detection
Iris recognition
fingerprint recognition
palm vien recognition.
All these can be used for Authentication
| Is This Answer Correct ? | 7 Yes | 1 No |
Post New Answer View All Answers
What if users of RSA run out of distinct primes?
Can DES be exported from the U.S.?
What is the significance of one-way functions for cryptography?
What other stream ciphers are there?
What is the GSS-API ?
At what point does an attack become practical ?
Is cryptography exportable from the U.S.?
What is a linear feedback shift register?
What are the best factoring methods in use today ?
What is a hard problem ?
What are alternatives to RSA?
Can rsa be exported from the united states?
Why use RSA rather than DES?
What are the most important attacks on MACs ?
What is cryptanalysis ?