Biometrics in Secure e Transactions
© 2013 Pearson. Controlling Access to Resources ◦ If criminals cannot get access, they cannot do harm. Authentication ◦ Proving one’s identity ◦ Cannot.