Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
Tracking technologies use pervasive information systems to scan and record the location of individuals and to transfer information about them to and from a central database. One p...
Libraries increasingly play an integral role as service providers in E-Government systems, but little has been done to assess the scope or trajectory of citizen needs in libraries...
Amelia N. Gibson, John Carlo Bertot, Charles R. Mc...
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
We have been developing a mobile passenger support system for public transport. Passengers can make their travel plans and purchase necessary tickets by accessing databases via th...