Search Results for - Narrowed by: User Interfaces and Human Computer Interaction. - Data Structures, Cryptology and Information Theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509User$002bInterfaces$002band$002bHuman$002bComputer$002bInteraction.$002509User$002bInterfaces$002band$002bHuman$002bComputer$002bInteraction.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300?2024-06-03T18:21:33ZSecuring Biometrics Applicationsent://SD_ILS/0/SD_ILS:5016522024-06-03T18:21:33Z2024-06-03T18:21:33Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Biometric User Authentication for it Security From Fundamentals to Handwritingent://SD_ILS/0/SD_ILS:5047302024-06-03T18:21:33Z2024-06-03T18:21:33Zby Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Unconstrained Face Recognitionent://SD_ILS/0/SD_ILS:5049212024-06-03T18:21:33Z2024-06-03T18:21:33Zby Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Enterprise Information Systems Vent://SD_ILS/0/SD_ILS:5062622024-06-03T18:21:33Z2024-06-03T18:21:33Zby Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-2673-0">http://dx.doi.org/10.1007/1-4020-2673-0</a><br/>Format: Electronic Resources<br/>