First Page | Document Content | |
---|---|---|
![]() Date: 2014-08-04 17:10:26Surveillance Automatic identification and data capture Identification Two-factor authentication Password Authentication Speaker recognition Security token Iris recognition Security Biometrics Access control | Add to Reading List |