Bromby, Michael C. - 2015
to be transferred securely and for the sender to be authenticated.The use of biometrics offers the potential to enhance … considerably the PKI model in restricting the use of your private key for encryption and decryption. The use of a fingerprint, for …