Author:
Evangelin L. Nisha,Fred A. Lenin
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Bansal M, Hanmandlu M, Kumar P (2016) IRIS based authentication using local principal independent components. Optik-Int J for Light & Electron Optic 127(11):4808–4814
2. Brocardo ML, Traore I, Woungang I (2015) Authorship verification of e-mail and tweet messages applied for continuous authentication. J Comput Syst Sci 81(8):1429–1440
3. Chaurasia P, Yogarajah P, Condell J, Prasad G, McIlhatton D, Monaghan R (2015) Biometrics and counter-terrorism: the case of gait recognition. Behavioral Sci of Terr & Politi Aggr 7(3):210–226
4. Dixon P (2008) Ethical issues implicit in library authentication and access management: Risks and best practices. J Libr Adm 47(3-4):141–162
5. D'Urso P, Giordani P (2005) Apossibilistic approach to latent component analysis for symmetric fuzzy data. Fuzzy Sets Syst 150(2):285–305
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献