ArticleA SURVEY ON SMARTPHONE PROTECTING IDENTIFICATION AGAINST ATTACKS USING BIOMETRIC AUTHENTICATION SYSTEMS
ArticleA SURVEY ON SMARTPHONE PROTECTING IDENTIFICATION AGAINST ATTACKS USING BIOMETRIC AUTHENTICATION SYSTEMS
ArticleThe Possibility of Applying Biometric Safety Technology in Egyptian Hotels: "Evaluating Customer Experience Using the TAM Model"
ArticleThe Possibility of Applying Biometric Safety Technology in Egyptian Hotels: "Evaluating Customer Experience Using the TAM Model"
ArticleA secure Multimodal Biometric Authentication with Cryptographic key Management Using Double Random Phase Encoding
ArticleA secure Multimodal Biometric Authentication with Cryptographic key Management Using Double Random Phase Encoding
ArticleEmploying biometric technology in document management: Managing the governmental university student records as a model
ArticleEmploying biometric technology in document management: Managing the governmental university student records as a model