Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Issue Section
Date
Availability
1-2 of 2
Keywords: Computer hardware
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Kybernetes
Kybernetes (2011) 40 (3-4): 618.
Published: 03 May 2011
... and optimising. It could well be a good introduction to quite a wide range of readers, which would include students on computer courses and also those who consider themselves to be software engineers. Computer hardware Cybernetics Optimization techniques Computer software The title of this book...
Journal Articles
A client/server implementation of an encryption system for fingerprint user authentication
Available to Purchase
Journal:
Kybernetes
Kybernetes (2008) 37 (8): 1111–1119.
Published: 17 September 2008
... be contacted at: fpujol@dtic.ua.es © Emerald Group Publishing Limited 2008 Cybernetics Cryptography Computer hardware Pattern recognition Biometrics Algorithms The term cryptography comes from Greek words Kryptos, which means “to hide,” and Graphos, which means...
