A Multi-View Facial Analysis Technique for Identity Authentication
IEEE Pervasive Computing
Biometrics for security in E-commerce
Payment technologies for E-commerce
Biometric identification systems
Signal Processing
Enhanced methods in computer security, biometric and artificial intelligence systems
Age dependency in handwritten dynamic signature verification systems
Pattern Recognition Letters
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
Iris recognition and the challenge of homeland and border control security in UAE
Telematics and Informatics
User Technology Readiness Measurement in Fingerprint Adoption at Higher Education Institution
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
A lightweight biometric signature scheme for user authentication over networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
An investigation of factors affecting biometric technology adoption in a developing country context
International Journal of Biometrics
Empirical analysis of biometric technology adoption and acceptance in Botswana
Journal of Systems and Software
FUZZ-IEEE'09 Proceedings of the 18th international conference on Fuzzy Systems
Digital rights management using a master control device
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Convergence of learning services
Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
Speaker identification system using empirical mode decomposition and an artificial neural network
Expert Systems with Applications: An International Journal
Some issues of biometrics: technology intelligence, progress and challenges
International Journal of Information Technology and Management
Security in context: investigating the impact of context on attitudes towards biometric technology
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
An empirical analysis of consumers' protection toward e-commerce transactions in Malaysia
International Journal of Business Information Systems
Hi-index | 0.00 |
As organizations search for more secure authentication methods for user access, e-commerce. and other security applications, biometrics is gaining increasing attention. But should your company use biometrics? And, if so, which ones should you use and how do you choose them? There is no one best biometric technology. Different applications require different biometrics. To select the right biometric for your situation, you will need to navigate through some complex vendor products and keep an eye on future developments in technology and standards. Your options have never been more diverse. After years of research and development, vendors now have several products to offer. Some are relatively immature, having only recently become commercially available, but even these can substantially improve your company's information security posture. We briefly describe some emerging biometric technologies to help guide your decision making