相关文章 - 综述及介绍  

 

           

2000

biometric authentication systems

V´aclav Maty´aˇs Jr.
Zden
ˇek ˇR´ıha

a report

 

Biometric Security Technologies

Ayhan EMRE

a report

2003

Biometrics FAQ

 

a summary

2000

Cellular security: better, but foes still lurk

Riezenman, M.J.;

Spectrum, IEEE Volume 37,  Issue 6,  June 2000 Page(s):39 - 42

2005

Methodological foundations: enabling the next generation of security

Maxion, R.A.; Roberts, R.R.M.;

Security & Privacy Magazine, IEEE Volume 3,  Issue 2,  March-April 2005 Page(s):54 - 57

2000

NATIONAL BIOMETRIC TEST CENTER COLLECTED WORKS 1997-2000

 

a paper collection

 

Opportunities and Benefits - Vision of the Biometrics Working Group

Wu Jian Kang and Huang Weimin Kent Ridge Digital Lab, Singapore

a report

2000

Parasitic authentication to protect your e-wallet

Ebringer, T.; Thorne, P.; Zheng, Y.;

Computer Volume 33,  Issue 10,  Oct. 2000 Page(s):54 - 60

2005

Privacy issues on biometric systems

Faundez-Zanuy, M.;

Aerospace and Electronic Systems Magazine, IEEE Volume 20,  Issue 2,  Feb 2005 Page(s):13 - 15

2005

Social acceptance of RFID as a biometric security method

Perakslis, C.; Wolk, R.;

Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005. Proceedings. 2005 International Symposium on June 8-10, 2005 Page(s):79 - 88

1999

The growing magic of automatic identification

Swartz, J.;

Robotics & Automation Magazine, IEEE Volume 6,  Issue 1,  March 1999 Page(s):20 - 23, 56

2005

Who are you? How to protect against identity theft

Elbirt, A.J.;

Technology and Society Magazine, IEEE Volume 24,  Issue 2,  Summer 2005 Page(s):5 - 8

2002

Who goes there? [personal identity systems]

 

Spectrum, IEEE Volume 39,  Issue 9,  Sep 2002 Page(s):39 - 40

2005

来自MIT人工智能实验室:如何做研究?

不详

作者:不详  来源于:北邮PRIS共享天地  发布时间:2005-4-13 10:51:52