Search
Now showing items 1-1 of 1
Integration of biometrics with cryptographic techniques for secure authentication of networked data access
(Fountain Publishers, Kampala., 2009)
The modern Information Technology evolution demands the use of computer networks with strict security performance. The password-based authentication system and the token-based systems that are current deployed, are not ...