

Author: Buhan Ileana Boom Bas Doumen Jeroen Hartel Pieter H. Veldhuis Raymond N.J.
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.4, Iss.1-2, 2009-02, pp. : 27-42
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Recent Patents on Computer Science, Vol. 1, Iss. 2, 2008-06 ,pp. :




Governing through biometrics: the biopolitics of identity
By Beer David
Information, Communication and Society, Vol. 17, Iss. 8, 2014-09 ,pp. :