1. Trace
  2. FaceStation의 다중 얼굴 템플릿
  3. L
  4. Leave Management
  5. Security Threats to Face Authentication and FaceStation 2 Technology
  6. Man-trap
  7. 얼굴 인증에 대한 보안의 위협, 그리고 FaceStation 2의 기술

  • Show page
  • Old revisions
  • Add to book
  • Export to PDF
  • Fold/unfold all

Login

You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in.

Log In

  • Last modified: 2015/10/07 08:34
  • (external edit)
Log In