|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 2 scholarly publications.
Information security
Databases
Control systems
Telecommunications
Biometrics
Human-machine interfaces
Computer security