Search alternatives:
biometrika » biometrical, biometrie
biometrics » geometrics, biometrys
biometric » geometric, biometry

1
by Reid, Paul
Published 2003
Pearson
Subjects: ...Biometric identification / http://id.loc.gov/authorities/subjects/sh2001010964...

2
by El Khoury, Franjieh
Published 2013
CRC Press
Subjects: ...Biometric identification / http://id.loc.gov/authorities/subjects/sh2001010964...

3
by Lehtinen, Rick
Published 2006
O'Reilly
Table of Contents: ... vulnerabilities -- Encryption -- Communications and network security -- Physical security and biometrics...

4
by Familiar, Bob
Published 2015
Apress, Springer
Table of Contents: ... Analytics Queries; Real-Time Notifications; Biometrics Alarm Worker; Testing Push Notifications; Real-Time...

5
by Bidgoli, Hossein
Published 2006
John Wiley
Table of Contents: ...Password Authentication -- Computer and Network Authentication -- Antivirus Technology -- Biometric...

6 Table of Contents: ...: Nonce-Free Hash Generation in Blockchain -- 5. Password Authentication Using Keystroke Biometric -- 6...

7
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ..., N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes...

8
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ...: passwords, biometrics, and digital signatures -- Digital identification II: digital certificates, CAs...

9
by Rouse, William B.
Published 2010
Wiley
Table of Contents: ... an Automotive Production Facility; 14. How Behavioral and Biometric Health Risk Factors Can Predict Medical...

10
by Vries, Henkjan de, Stjernlöf, Lovisa Stenbäcken
Published 2023
Packt Publishing Ltd.
Table of Contents: ... factors -- Possession factors -- Biometric factors -- Authenticators and enrollment -- Knowledge factors...

11
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... of workplace surveillance -- How cell phones can be hacked -- How Biometrics works -- How Radio Frequency ID...

12
Published 2013
Wiley
Table of Contents: ... -- (e) Push and Poll: Integrating Data into Time Management Systems -- (f) The Future -- 5.5 BIOMETRICS...

13
by Gilman, Evan, Barth, Doug
Published 2017
O'Reilly Media
Table of Contents: ... Have: Security Tokens; Something You Are: Biometrics; Out-of-Band Authentication; Single Sign...

14
by Andress, Jason
Published 2014
Syngress
Table of Contents: ...Mutual authenticationPasswords; More advanced; Biometrics; Additional resources; Characteristics...

15
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ... lifecycle; Authentication and authorization frameworks for IIoT; Password-based authentication; Biometrics...

16
by Grimes, Roger A.
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics...

17
by Garbis, Jason, Chapman, Jerry W.
Published 2021
Apress
Table of Contents: ... Connect (OIDC) -- Certificate-Based Authentication -- FIDO2 -- Mobile and Biometrics -- Authorization...

18
Published 2013
Morgan Kaufmann/Elsevier
... at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics...

19 Table of Contents: ...Account Policies -- Authorization -- Identity -- Authentication Methods -- Biometric Factors...

20
by LaLonde, Robert John
Published 2016
Edward Elgar Publishing Limited
Table of Contents: ... (2009), 'Dealing with Limited Overlap in Estimation of Average Treatment Effects', Biometrika, 96 (1...