Biometrics Identity Authentication in Secure Electronic Transactions
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 0
Abstract
There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even the twins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.
Authors and Affiliations
Deepu Saini , Dr. Vijay Singh Rathore
MARKOV CHAIN MODELING OF PERFORMANCE DEGRADATION OF PHOTOVOLTAIC SYSTEM
Modern probability theory studies chance processes for which the knowledge of previous outcomes influence predictions for future experiments. In principle, when a sequence of chance experiments, all of the past outcomes...
Implementation of CBIR Method and its Architecture
In present world, the usage of internet and World Wide Web is rapidly increasing and due to which information storage and retrieval from databases become a important task. In this information images plays a great role. T...
Design of Model for Component Based System
This paper is based on designing such kind of model that will enhance the reusability of software modules, while component based software development approach is used to develop software. It is widely growing engineering...
An Improved Approach to perform Crawling and avoid Duplicate Web Pages
When a web search is performed it includes many duplicate web pages or the websites. It means we can get number of similar pages at different web servers. We are proposing a Web Crawling Approach to Detect and avoid Dupl...
A LITERARY REVIEW OF MANET SECURITY PROTOCOLS
Ad hoc networks offer various applications which are very much essential in wireless networks. But the vital problem concerning their security aspects is the major issue which must be solved. A mobile adhoc network is a...