Biometrics Identity Authentication in Secure Electronic Transactions
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 0
Abstract
There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even the twins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.
Authors and Affiliations
Deepu Saini , Dr. Vijay Singh Rathore
An Enhanced Approach for Human Computer Interface
In this paper here will discuss biometric approach [1] that are used to create such kind of interface between human being and computer that are more reliable, fast, efficient, robust and produce usable and safe system as...
A Novel Security Approach in Mobile Agent Using Encryption
The appearance of software agents has given rise too much discussion of what such an agent is and how it differs from programs in general. An agent is anything that can be viewed as perceiving its environment through sen...
ADAPTABILITY OF TOTAL QUALITY MANAGEMENT TO SERVICE SECTOR
This Research paper underlines the dominance of service quality and adaptability of TQM in the service sector. It explains that with the growing maturity of society with respect to education, culture and standards of liv...
ON-LINE ANALYTICAL PROCESSING (OLAP) ON NETWORKS
We propose a framework for efficient OLAP on networks with a focus on the most interesting kind, the topological OLAP (called “T- OLAP”), which incurs topological changes in the underlying networks. Topological OLAP oper...
Better Management of Defects for Improving Software Processes
Every software after development needs to get tested. No software can be built “Defect Free”. After testing defects are reported by the use of a tool called “Defect Tracking System”. Also Defects reported can be managed...