PROMISES AND CHALLENGES OF BIOMETRICS IN INFORMATION SECURITY

被引:0
|
作者
HEIMBACH, PJ
机构
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:B27 / B36
页数:10
相关论文
共 50 条
  • [21] Information security - Challenges for the next millennium
    Stanley, AK
    [J]. INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 3 - 8
  • [22] Challenges in Power System Information Security
    Dan, Gyorgy
    Sandberg, Henrik
    Ekstedt, Mathias
    Bjoerkman, Gunnar
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (04) : 62 - 70
  • [23] Critical Information Security Challenges: An Appraisal
    Mir, Mohammad Shuaib
    Wani, Sharyar
    Ibrahim, Jamauldin
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M), 2013,
  • [24] BioSec: Biometrics and security towards trust and security
    Sanchez, O
    [J]. EADOPTION AND THE KNOWLEDGE ECONOMY: ISSUES, APPLICATIONS, CASE STUDIES, PTS 1 AND 2, 2004, 1 : 203 - 210
  • [25] Iris biometrics for network security
    Ezekiel, Soundararajan
    Oblitey, William
    Trimble, Robert
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS, 2006, : 131 - +
  • [26] Image Security and Biometrics: A Review
    Marques, Ion
    Grana, Manuel
    [J]. HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, PT II, 2012, 7209 : 436 - 447
  • [27] Iris as Biometrics for Security System
    Bhaganagare, Bhakti B.
    Harale, Avinash. D.
    [J]. PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [28] Biometrics are the key to data security
    Earley, Mark
    [J]. ECONTENT, 2006, 29 (07) : 38 - 42
  • [29] Necessity, challenges, and promises of peer-to-peer architecture of information systems
    Král, J
    Zemlicka, M
    [J]. NEW PERSPECTIVES ON INFORMATION SYSTEMS DEVELOPMENT: THEORY, METHODS AND PRACTICE, 2002, : 125 - 134
  • [30] Biometrics: A new era in security
    Lawton, G
    [J]. COMPUTER, 1998, 31 (08) : 16 - 18