Denial of Access in Biometrics-Based Authentication Systems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
On the use of PKI technologies for secure and private e-learning environments
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Combined speech recognition and speaker verification over the fixed and mobile telephone networks
SPPRA'06 Proceedings of the 24th IASTED international conference on Signal processing, pattern recognition, and applications
On-line signature recognition based on VQ-DTW
Pattern Recognition
An extended model of security policy for multi-applicative smart cards
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
From Scores to Face Templates: A Model-Based Approach
IEEE Transactions on Pattern Analysis and Machine Intelligence
Pattern Recognition
Information Systems Management
Usefulness of Retina Codes in Biometrics
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Integrating fingerprint verification into the smart card-based healthcare information system
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Ethical issues in governing biometric technologies
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
Design and VLSI implementation of a high-performance face detection engine
Computers and Electrical Engineering
Next generation biometric security system: an approach for mobile device security
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hi-index | 0.00 |
From the Publisher:No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce fraud. Along with this broad-scale deployment comes a wide range of critical issues, including privacy risks, secure biometric system design, and the strengths and weaknesses of leading technologies such as finger-scan, iris-scan, facial-scan, voice-scan, and signature-scan. A full understanding of the biometric technologies, applications, and markets is required for successful utilization of biometrics in today's enterprise environment. Written by leading industry authorities, this book provides you with everything you need to know about the technology, the industry, the applications, and the challenges that define biometrics today. It explains why institutions are turning to biometrics to authenticate employees, customers, and citizens in mission-critical applications. It also provides a broad conceptual understanding of the technology, explains specialized terms and concepts, and concludes with an analysis of the factors you must consider when designing, deploying, and maintaining biometric systems.