Buscas alternativas:
encryption algorithm » extraction algorithm (Expandir a busca), consumption algorithm (Expandir a busca), evolution algorithm (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
of encryption » rsa encryption (Expandir a busca), key encryption (Expandir a busca), xml encryption (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using of » fusing of (Expandir a busca), using on (Expandir a busca), housing of (Expandir a busca)
encryption algorithm » extraction algorithm (Expandir a busca), consumption algorithm (Expandir a busca), evolution algorithm (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
of encryption » rsa encryption (Expandir a busca), key encryption (Expandir a busca), xml encryption (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using of » fusing of (Expandir a busca), using on (Expandir a busca), housing of (Expandir a busca)
1
Assuntos:
“...Biometrics with encryption...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
2
Assuntos:
“...Biometrics with encryption...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese