References
[1]. Application of Biometric Technology Solutions to
Enhance Security. (n.d.). In www.chemicalprocessing.
com. Retrieved from https://www.chemicalprocessing.
com/assets/Media/MediaManager/FingerprintsIncrease
Security.pdf
[2]. Bonneau, J., & Schechter, S. E. (2014, August).
Towards reliable storage of 56-bit secrets in human
memory. In USENIX Security Symposium (pp. 607-623).
[3]. Chang, H. B., & Schroeter, K. G. (2010). Creating safe
and trusted social networks with biometric user
authentication. In Ethics and Policy of Biometrics (pp. 89-95). Springer, Berlin, Heidelberg.
[4]. Counter, P. B. (2014). The biometric social network and
keystroke authentication. In findbiometrics.com.
Retrieved from https://findbiometrics.com/the-biometricsocial-
network-and-keystroke-authentication-01241401/
[5]. Cyber security community by TATA group of
companies (n.d.). Retrieved from https://security
community.tcs.com/infosecsoapbox/
[6]. Deans, D. H. (n.d). How biometric authentication apps
enhance security. In socialmediatoday.com. https://
www.socialmediatoday.com/ users/david-h-deans/
[7]. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An
introduction to biometric recognition. IEEE Transactions
on Circuits and Systems for Video Technology, 14(1), 4-20.
[8]. Prabhakar, S., Pankanti, S., & Jain, A. K. (2003).
Biometric recognition: Security and privacy concerns.
IEEE Security & Privacy, (2), 33-42.
[9]. Samakoti, T., Naseera, S., & Pramila, T. (2016).
Perception of trend topic in twitter: A case study. i-manager's
Journal on Software Engineering, 11(4), 12-17.