Table of Contents
Computers, Volume 7, Issue 3 (September 2018)
- Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
- You may sign up for e-mail alerts to receive table of contents of newly released issues.
- PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story (view full-size image) Biometrics play an important role for today’s mobile security. Security experts have attempted to [...] Read more. Biometrics play an important role for today’s mobile security. Security experts have attempted to integrate different forms of biometrics in their devices. Recently, facial biometrics has introduced a new method for a more secure form of authentication. As these new improved methods are introduced, some credibility has been lost in the older methods used for authentication such as photographs, electronic images, and look alikes. This paper explores the scientific background as to why facial biometrics have become a trusted form of authentication, and user-friendly method, and explores the range of security of mobile device applications available for Android and iOS systems. View this paper.