September 27, 2005

Finger On The Pulse Of Identity

LogError writes "The contours of the finger, the patterns of the iris and the shape of the hand can all be used to provide strong authentication, but are these - and other – biometric technologies sufficient to provide good security while also ensuring the privacy and trust of end users?"



  • Security
Click Here!