Search Results for - Narrowed by: User Interfaces and Human Computer Interaction. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509User$002bInterfaces$002band$002bHuman$002bComputer$002bInteraction.$002509User$002bInterfaces$002band$002bHuman$002bComputer$002bInteraction.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-06-03T18:21:33Z Securing Biometrics Applications ent://SD_ILS/0/SD_ILS:501652 2024-06-03T18:21:33Z 2024-06-03T18:21:33Z by&#160;Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format:&#160;Electronic Resources<br/> Biometric User Authentication for it Security From Fundamentals to Handwriting ent://SD_ILS/0/SD_ILS:504730 2024-06-03T18:21:33Z 2024-06-03T18:21:33Z by&#160;Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format:&#160;Electronic Resources<br/> Unconstrained Face Recognition ent://SD_ILS/0/SD_ILS:504921 2024-06-03T18:21:33Z 2024-06-03T18:21:33Z by&#160;Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Information Systems V ent://SD_ILS/0/SD_ILS:506262 2024-06-03T18:21:33Z 2024-06-03T18:21:33Z by&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-2673-0">http://dx.doi.org/10.1007/1-4020-2673-0</a><br/>Format:&#160;Electronic Resources<br/>