<--- Back to Details
First PageDocument Content
Biometrics / Cryptography / Security / Access control / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy
Date: 2011-02-20 12:09:41
Biometrics
Cryptography
Security
Access control
Identification
Fingerprints
Fingerprinting algorithms
Fingerprint recognition
Surveillance
Fingerprint
Public key fingerprint
Privacy

Preprint of paper for WIFS2010. 1 INTRODUCTION

Add to Reading List

Source URL: www.vast.uccs.edu

Download Document from Source Website

File Size: 2,27 MB

Share Document on Facebook

Similar Documents

Multimodal Identification Evolution provides multimodal biometric identification by capturing fingerprints and/or photos (for facial recognition), then returning hit results.

DocID: 1vhsj - View Document

Can Unicorns Help Users Compare Crypto Key Fingerprints? (Supplementary Material) (hex version) will need to manually type the SSN into the database, since

DocID: 1uTqn - View Document

BIOINFORMATICS APPLICATIONS NOTE Vol. 19 no, pages 776–777 DOI: bioinformatics/btg090 AFLPinSilico, simulating AFLP fingerprints

DocID: 1uPhH - View Document

TopologicalPharmacophoreAtomPairsFingerprints.pl NAME TopologicalPharmacophoreAtomPairsFingerprints.pl - Generate topological pharmacophore atom pairs fingerprints for SD files

DocID: 1utma - View Document

TopologicalPharmacophoreAtomPairsFingerprints.pl NAME TopologicalPharmacophoreAtomPairsFingerprints.pl - Generate topological pharmacophore atom pairs fingerprints for SD files SYNOPSIS

DocID: 1u757 - View Document