Full Text Available
Note: Clicking the button above will open the full text document at the original institutional repository in a new window.
The need for a robust and secured access control system using a suitable algorithm is highly inevitable to forestall daily online harkers that are responsible in defrauding people of invaluable information and transactions worth billions of dollars in the process. In this paper, faces were employed...
| Format: | Article |
|---|---|
| Published: |
2007
|
| Tags: |
No Tags, Be the first to tag this record!
|