Making sense of science
You are here
12.08.2016
When looking at data protection protocols, even the most robust encryption can be breached if the other elements of the protocol are weak.
Article
04.28.2016
After fingerprints, face or iris scans, researchers are now exploring new biometric identification methods, based this time on the very unique way we move or interact with our smartphones.