Biometrics Identity Authentication in Secure Electronic Transactions
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 0
Abstract
There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even the twins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.
Authors and Affiliations
Deepu Saini , Dr. Vijay Singh Rathore
Data warehousing and Phases used in Internet Mining
In this paper, we describe the data warehousing and data mining. Data Warehousing is the process of storing the data on large scale and Data mining is the process of analyzing data from different perspectives and summar...
DIGITAL WATERMARKING – A SOLUTION FOR COPYRIGHT PROTECTION OF MULTIMEDIA DATA
The recent progress in the digital multimedia technologies has offered any facilities in the transmission, reproduction & manipulation of data. However, this advancement has also brought the challenge such as copyrig...
A Hybrid Approach Using C Mean and CART for Classification in Data Mining
Data Mining is a field of search and researches of data. Mining the data means fetching out a piece of data from a huge data block. The basic work in the data mining can be categorized in two subsequent ways. One is ca...
AN IMPROVED FUZZY MODEL TO PREDICT SOFTWARE RELIABILITY
Software faults are one of major criteria to estimate the software quality or the software reliability. There are number of matrices defined that uses the software faults to estimate the software quality. But when we hav...
REVIEW OF ARTIFICIAL IMMUNE SYSTEM TO ENHANCE SECURITY IN MOBILE AD-HOC SYSTEMS
Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not...