Return to Article Details
Finding a Suitable and Secure Threshold Value for an Iris Authentication
Download
Download PDF