Biometric authentication: A review

被引:0
|
作者
Bhattacharyya, Debnath [1 ]
Ranjan, Rahul [1 ]
Farkhod Alisherov, A. [2 ]
Choi, Minkyu [1 ]
机构
[1] Computer Science and Engineering, Department Heritage Institute of Technology, Kolkata-700107, India
[2] Hannam University, Daejeon-306791, Korea, Republic of
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:13 / 28
相关论文
共 50 条
  • [31] Biometric authentication -: Security and usability
    Matyas, V
    Ríha, Z
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 227 - 239
  • [32] AUTHENTICATION BY BIOMETRIC VERIFICATION INTRODUCTION
    Vetter, Ron
    COMPUTER, 2010, 43 (02) : 28 - 29
  • [33] Biometric authentication in infrastructure security
    Armington, J
    Ho, P
    Koznek, P
    Martinez, R
    INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 1 - 18
  • [34] Biometric Authentication for Older Adults
    Kowtko, Marc Alexander
    2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,
  • [35] A Novel Authentication Biometric for Pacemakers
    Heather, Kenedi
    Shah, Kunal K.
    Venkatasubramanian, Krishna K.
    Cai, Hang
    Hoyme, Ken
    Seeberger, Michael
    Wiechman, Grace
    2018 IEEE/ACM INTERNATIONAL CONFERECE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2018, : 81 - 87
  • [36] Cognition for Enhanced Biometric Authentication
    Zivic, Natasa
    Ruland, Christoph
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 241 - 244
  • [37] Hazards of Biometric Authentication in Practice
    Phang, Samantha S. S.
    Pavlovski, Christopher J.
    INFORMATION TECHNOLOGY IN INDUSTRY, 2016, 4 (01): : 34 - 40
  • [38] A survey of biometric authentication systems
    Qazi, FA
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 61 - 67
  • [39] Photoplethysmography as a Form of Biometric Authentication
    Lee, Anthony
    Kim, Younghyun
    2015 IEEE SENSORS, 2015, : 1744 - 1745
  • [40] Multimodal biometric authentication: an example
    Baltatu, M
    D'Alessandro, R
    D'Amico, R
    ISSE 2005 - Securing Electronic Business Processes, 2005, : 220 - 228