Main Article Content
Abstract
Keywords
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of
References
- Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric Identification". Communications of the
- ACM, 43(2), p. 91- 98. DOI 10.1145/328236.328110.
- Advantages and disadvantages of Biometrics,
- http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%
- technologies
- Keylogger, http://www.webopedia.com/TERM/K/keylogger.html
- Shoulder surfing, http://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)
- Kumar, M., Garfinkel, T., Boneh, D., & Winograd, T. (2007). “Reducing Shoulder-surfing by
- Using Gaze-based Password Entryâ€
- Disadvantages and advantages of Biometrics,
- http://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics
- Dictionary attack, http://searchsecurity.techtarget.com/definition/dictionary-attack
- CAPTCHA, http://www.captcha.net/
- SHA-1 function in PHP, http://php.net/manual/en/function.sha1.php
- About QR codes, http://www.qrcode.com/en/aboutqr.html
- “Global Growth in Mobile Barcode Usage - Q4 / 2010", 3GVision, 5 January 2011.
- jQuery, http://jquery.com/
- What is PHP, http://php.net/manual/en/intro-whatis.php
- What is MySQL, http://dev.mysql.com/doc/refman/4.1/en/what-is-mysql.html
- Android SDK, http://developer.android.com/sdk/index.html
References
Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric Identification". Communications of the
ACM, 43(2), p. 91- 98. DOI 10.1145/328236.328110.
Advantages and disadvantages of Biometrics,
http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%
technologies
Keylogger, http://www.webopedia.com/TERM/K/keylogger.html
Shoulder surfing, http://en.wikipedia.org/wiki/Shoulder_surfing_(computer_security)
Kumar, M., Garfinkel, T., Boneh, D., & Winograd, T. (2007). “Reducing Shoulder-surfing by
Using Gaze-based Password Entryâ€
Disadvantages and advantages of Biometrics,
http://wiki.answers.com/Q/What_are_the_disadvantages_and_advantages_of_biometrics
Dictionary attack, http://searchsecurity.techtarget.com/definition/dictionary-attack
CAPTCHA, http://www.captcha.net/
SHA-1 function in PHP, http://php.net/manual/en/function.sha1.php
About QR codes, http://www.qrcode.com/en/aboutqr.html
“Global Growth in Mobile Barcode Usage - Q4 / 2010", 3GVision, 5 January 2011.
jQuery, http://jquery.com/
What is PHP, http://php.net/manual/en/intro-whatis.php
What is MySQL, http://dev.mysql.com/doc/refman/4.1/en/what-is-mysql.html
Android SDK, http://developer.android.com/sdk/index.html