Types of biometric authentication and methods of their evaluation

Gespeichert in:
Bibliographische Detailangaben
Datum:2017
Hauptverfasser: K. V. Kolesnikov, B. P. Obodovskyi
Format: Artikel
Sprache:Englisch
Veröffentlicht: 2017
Schriftenreihe:Artificial intelligence
Online Zugang:http://jnas.nbuv.gov.ua/article/UJRN-0000876961
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Назва журналу:Library portal of National Academy of Sciences of Ukraine | LibNAS

Institution

Library portal of National Academy of Sciences of Ukraine | LibNAS
_version_ 1859510660236312576
author K. V. Kolesnikov
B. P. Obodovskyi
author_facet K. V. Kolesnikov
B. P. Obodovskyi
author_sort K. V. Kolesnikov
collection Open-Science
first_indexed 2025-07-17T20:16:57Z
format Article
id open-sciencenbuvgovua-42752
institution Library portal of National Academy of Sciences of Ukraine | LibNAS
language English
last_indexed 2025-07-17T20:16:57Z
publishDate 2017
record_format dspace
series Artificial intelligence
spelling open-sciencenbuvgovua-427522024-02-29T12:00:13Z Types of biometric authentication and methods of their evaluation K. V. Kolesnikov B. P. Obodovskyi 2710-1673 2017 en Artificial intelligence http://jnas.nbuv.gov.ua/article/UJRN-0000876961 Article
spellingShingle Artificial intelligence
K. V. Kolesnikov
B. P. Obodovskyi
Types of biometric authentication and methods of their evaluation
title Types of biometric authentication and methods of their evaluation
title_full Types of biometric authentication and methods of their evaluation
title_fullStr Types of biometric authentication and methods of their evaluation
title_full_unstemmed Types of biometric authentication and methods of their evaluation
title_short Types of biometric authentication and methods of their evaluation
title_sort types of biometric authentication and methods of their evaluation
url http://jnas.nbuv.gov.ua/article/UJRN-0000876961
work_keys_str_mv AT kvkolesnikov typesofbiometricauthenticationandmethodsoftheirevaluation
AT bpobodovskyi typesofbiometricauthenticationandmethodsoftheirevaluation