Buscas alternativas:
authentication algorithm » segmentation algorithm (Expandir a busca)
phase authentication » art authentication (Expandir a busca), user authentication (Expandir a busca), layer authentication (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using phase » using phage (Expandir a busca), during phase (Expandir a busca), using pose (Expandir a busca)
authentication algorithm » segmentation algorithm (Expandir a busca)
phase authentication » art authentication (Expandir a busca), user authentication (Expandir a busca), layer authentication (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using phase » using phage (Expandir a busca), during phase (Expandir a busca), using pose (Expandir a busca)
1
Assuntos:
“...Dagman method...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
2
Assuntos:
“...Dagman method...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese