Computer ethics: cautionary tales and ethical dilemmas in computing
Computer ethics: cautionary tales and ethical dilemmas in computing
Privacy on the line: the politics of wiretapping and encryption
Privacy on the line: the politics of wiretapping and encryption
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Twin Test: On Discriminability of Fingerprints
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
User validation for mobile telephones
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 02
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.02 |
This paper will identify and recommend biometric technologies that provide strong authentication, convenient usability, and versatility, in order to meet the demand of enterprise infrastructure security systems. We aim at validating suitability for one or more mainstream applications. Finger scan technology is mature and widely available. The combination of a finger scan and smart card gives true dual-factor authentication that provides a greater degree of security and simplifies authentication for end users while preserving privacy. Speaker Verification is the most natural biometric technology to use with voice-based systems. It takes advantage of the ubiquitous voice-grade telephone channel. The combination of speaker verification and token technology can provide convenient and secure access to voice portal applications. We also discuss cultural, legal, and privacy issues based on religious objections, health concerns, legal restrictions, and regulations on the use of biometric technology.