2002 |
biometric authentication systems |
V´aclav Maty´aˇs Jr. Zdenˇek ˇR´ıha |
a report |
|
Biometric Security Technologies |
Ayhan EMRE |
a report |
2003 |
Biometrics FAQ |
|
a summary |
2000 |
Cellular security: better, but foes still lurk |
Riezenman, M.J.; |
Spectrum, IEEE Volume 37, Issue 6, June 2000 Page(s):39 - 42 |
2005 |
Methodological foundations: enabling the next generation of security |
Maxion, R.A.; Roberts, R.R.M.; |
Security & Privacy Magazine, IEEE Volume 3, Issue 2, March-April 2005 Page(s):54 - 57 |
2000 |
NATIONAL BIOMETRIC TEST CENTER COLLECTED WORKS 1997-2000 |
|
a paper collection |
|
Opportunities and Benefits - Vision of the Biometrics Working Group |
Wu Jian Kang and Huang Weimin Kent Ridge Digital Lab, Singapore |
a report |
2000 |
Parasitic authentication to protect your e-wallet |
Ebringer, T.; Thorne, P.; Zheng, Y.; |
Computer Volume 33, Issue 10, Oct. 2000 Page(s):54 - 60 |
2005 |
Privacy issues on biometric systems |
Faundez-Zanuy, M.; |
Aerospace and Electronic Systems Magazine, IEEE Volume 20, Issue 2, Feb 2005 Page(s):13 - 15 |
2005 |
Social acceptance of RFID as a biometric security method |
Perakslis, C.; Wolk, R.; |
Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005. Proceedings. 2005 International Symposium on June 8-10, 2005 Page(s):79 - 88 |
1999 |
The growing “magic” of automatic identification |
Swartz, J.; |
Robotics & Automation Magazine, IEEE Volume 6, Issue 1, March 1999 Page(s):20 - 23, 56 |
2005 |
Who are you? How to protect against identity theft |
Elbirt, A.J.; |
Technology and Society Magazine, IEEE Volume 24, Issue 2, Summer 2005 Page(s):5 - 8 |
2002 |
Who goes there? [personal identity systems] |
|
Spectrum, IEEE Volume 39, Issue 9, Sep 2002 Page(s):39 - 40 |
2005 |
来自MIT人工智能实验室:如何做研究? |
不详 |
作者:不详 来源于:北邮PRIS共享天地 发布时间:2005-4-13 10:51:52 |