Answer Posted / deepa
those are technics like
face detection
Iris recognition
fingerprint recognition
palm vien recognition.
All these can be used for Authentication
| Is This Answer Correct ? | 7 Yes | 1 No |
Post New Answer View All Answers
What is the Current Status of Clipper ?
What if users of RSA run out of distinct primes?
What is cryptanalysis ?
What are shift register cascades?
What is RIPEM?
Why use RSA rather than DES?
What are the prospects for theoretical factoring breakthroughs?
What are some of the more popular techniques in cryptography ?
How are certifying authorities susceptible to attack ?
What is a hard problem ?
What is the GSS-API ?
What other stream ciphers are there?
What are some other hard problems ?
Can users of rsa run out of distinct primes?
What is SSH ?