2002 biometric authentication systems V´aclav Maty´aˇs Jr. Zdenˇek ˇR´ıha a report
Biometric Security Technologies Ayhan EMRE a report
2003 Biometrics FAQ a summary
2000 Cellular security: better, but foes still lurk Riezenman, M.J.; Spectrum, IEEE Volume 37, Issue 6, June 2000 Page(s):39 - 42
2005 Methodological foundations: enabling the next generation of security Maxion, R.A.; Roberts, R.R.M.; Security & Privacy Magazine, IEEE Volume 3, Issue 2, March-April 2005 Page(s):54 - 57
2000 NATIONAL BIOMETRIC TEST CENTER COLLECTED WORKS 1997-2000 a paper collection
Opportunities and Benefits - Vision of the Biometrics Working Group Wu Jian Kang and Huang Weimin Kent Ridge Digital Lab, Singapore a report
2000 Parasitic authentication to protect your e-wallet Ebringer, T.; Thorne, P.; Zheng, Y.; Computer Volume 33, Issue 10, Oct. 2000 Page(s):54 - 60
2005 Privacy issues on biometric systems Faundez-Zanuy, M.; Aerospace and Electronic Systems Magazine, IEEE Volume 20, Issue 2, Feb 2005 Page(s):13 - 15
2005 Social acceptance of RFID as a biometric security method Perakslis, C.; Wolk, R.; Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005. Proceedings. 2005 International Symposium on June 8-10, 2005 Page(s):79 - 88
1999 The growing “magic” of automatic identification Swartz, J.; Robotics & Automation Magazine, IEEE Volume 6, Issue 1, March 1999 Page(s):20 - 23, 56
2005 Who are you? How to protect against identity theft Elbirt, A.J.; Technology and Society Magazine, IEEE Volume 24, Issue 2, Summer 2005 Page(s):5 - 8
2002 Who goes there? [personal identity systems] Spectrum, IEEE Volume 39, Issue 9, Sep 2002 Page(s):39 - 40
2005 来自MIT人工智能实验室:如何做研究? 不详 作者:不详  来源于:北邮PRIS共享天地  发布时间:2005-4-13 10:51:52