This author's articles
17 October 2005
The first part of this paper deals with biometric technologies used for authentication purposes, e.g. facial recognition, iris patterns and fingerprints. It is noted that biometric identification techniques are in principle more effective than computer ID processes such as passwords or digital signatures.