Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Management of Information Security
Management of Information Security
User Technology Readiness Measurement in Fingerprint Adoption at Higher Education Institution
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Biometrics: body odor authentication perception and acceptance
ACM SIGCAS Computers and Society
Biometric access control for e-health records in pre-hospital care
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Hi-index | 0.00 |
This paper introduces readers to the world of information technology and data security as a part of it. It talks about access control, its components, and levels and types of access control. The paper recognizes the importance of identifying and authenticating any given user in the business areas. Therefore, it gives full attention to biometrics as one of the access control technology and discusses variety and performance of other known techniques; points out the advantages and disadvantages of using them. The paper also presents some real life examples of companies, implementing biometric solutions in their businesses.