LogError writes “The contours of the finger, the patterns of the iris and the shape of the hand can all be used to provide strong authentication, but are these – and other – biometric technologies sufficient to provide good security while also ensuring the privacy and trust of end users?”
Link: net-security.org
Category:
- Security