An overview of fingerprint verification
✍
Lawrence O'Gorman
📂
Article
📅
1999
🏛
Elsevier Science
🌐
English
⚖ 267 KB
## Report highlights number of such messages depends on whether the entity authentication mechanism is one, two or three pass, while the mechanism itself can be based on symmetric or asymmetric algorithms or cryptographic check functions. If the responding party cannot comply with the requested me