Boukhonine et al., 2005 - Google Patents
Future security approaches and biometricsBoukhonine et al., 2005
View PDF- Document ID
- 2761502788038105346
- Author
- Boukhonine S
- Krotov V
- Rupert B
- Publication year
- Publication venue
- Communications of the Association for Information Systems
External Links
Snippet
Threats to information security are proliferating rapidly, placing demanding requirements on protecting tangible and intangible business and individual assets. Biometrics can improve security by replacing or complementing traditional security technologies. This tutorial …
- 238000005516 engineering process 0 abstract description 53
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vacca | Biometric technologies and verification systems | |
Dasgupta et al. | Advances in user authentication | |
Bolle et al. | Guide to biometrics | |
Nanavati | Biometrics | |
Kim | Biometrics, is it a viable proposition for identity authentication and access control? | |
Das | Biometric technology: authentication, biocryptography, and cloud-based architecture | |
Boukhonine et al. | Future security approaches and biometrics | |
Yun | The ‘123’of biometric technology | |
Dasgupta et al. | Biometric Authentication: Authentication through human characteristics | |
Rosenzweig et al. | Biometric Technologies: Security, legal, and policy implications | |
Olorunsola et al. | Assessment of privacy and security perception of biometric technology case study of Kaduna state tertiary academic institutions | |
Heyer | Biometrics technology review 2008 | |
Braghin | Biometric authentication | |
Sharma et al. | Biometrics: Introduction and applications | |
Lott | Biometrics: modernising customer authentication for financial services and payments | |
Al Abdulwahid | Federated authentication using the cloud (Cloud Aura) | |
Lott et al. | Improving customer authentication | |
Kindt | The Processing of Biometric Data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework. | |
Iqbal et al. | Biometrics Technology: Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare | |
Gupta | Biometrics: Enhancing security in organizations | |
Oluwatoyin et al. | Effective and Efficient Means to Prevent and Minimize Identity and Identity Cards Theft, Criminal Vices and Unauthorized Access to Places in Nigeria | |
Woodword | Biometrics: The Ultimate Reference | |
Xiao et al. | Trusted User Authentication Using Biometrics | |
Frye et al. | The body as a password: considerations, uses, and concerns of biometric technologies | |
Zahidi | Biometrics-evaluation of current situation |