Communications in Computer and Information Science BL Tait, B Von Solms Biometrically based electronic signatures for a public networked environment, 2009 | 21* | 2009 |
Aspects of Biometric Security in Internet of Things Devices BL Tait Digital Forensic Investigation of Internet of Things (IoT) Devices, 169-186, 2021 | 7 | 2021 |
Secure biometrically based authentication protocol for a public network environment B Tait, B von Solms Global E-Security, 239-246, 2008 | 5 | 2008 |
Solving the problem of replay in Biometrics-An electronic commerce Example SH Von Solms, BL Tait Proceedings of the 5th IFIP Conference on Challenges of expanding internet …, 2005 | 5 | 2005 |
Secure cloud-based biometric authentication utilising smart devices for electronic transactions BL Tait International Journal of Electronic Security and Digital Forensics 9 6 (1 …, 2014 | 4 | 2014 |
Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter BL Tait International Conference on Global Security, Safety, and Sustainability, 348-359, 2015 | 3 | 2015 |
The biometric landscape–towards a sustainable biometric terminology framework BL Tait International Journal of Electronic Security and Digital Forensics 9 6 (2 …, 2014 | 3 | 2014 |
ICT Education B Tait, J Kroeze, S Gruner Encyclopedia of the Sciences of Learning. Northern Drakensberg: Springer, 2012 | 3 | 2012 |
Applied phon curve algorithm for improved voice recognition and authentication BL Tait International Conference on e-Democracy, 23-30, 2011 | 3 | 2011 |
Biometrically based electronic signatures for a public networked environment B Tait, B von Solms Global Security, Safety, and Sustainability: 5th International Conference …, 2009 | 3 | 2009 |
Behavioural Biometrics Authentication Tested Using EyeWriter Technology BL Tait 2019 IEEE 12th International Conference on Global Security, Safety and …, 2019 | 2 | 2019 |
Aspects of Voice Communications Fraud A Helenport, BL Tait International Conference on Global Security, Safety, and Sustainability, 69-81, 2016 | 2 | 2016 |
UMS-dev-sec: a proposed framework to address security concerns of UMS devices K Molotsi, BL Tait Proceedings of the South African Institute for Computer Scientists and …, 2013 | 2 | 2013 |
Applied Fletcher-Munson curve algorithm for improved voice recognition BL Tait International Journal of Electronic Security and Digital Forensics 7 4 (2-3 …, 2012 | 2 | 2012 |
BioVault: biometrically based encryption BL Tait, SH Von Solms International Journal of Electronic Security and Digital Forensics 2 (3 …, 2009 | 2 | 2009 |
IoT-Penn: A Security Penetration Tester for MQTT in the IoT Environment A Roets, BL Tait Cybersecurity in the Age of Smart Societies, 141-157, 2023 | 1 | 2023 |
Application of a Digraph for Behavioural Eye Tracking Biometrics BL Tait International Conference on Global Security, Safety, and Sustainability, 252-265, 2016 | 1 | 2016 |
ACM International Conference Proceeding Series K Molotsi, BL Tait South African Institute for Computer Scientists and Information …, 2013 | 1* | 2013 |
Biovault: Solving the Problem of Replay in Biometrics B von Solms, B Tait Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government …, 2005 | 1 | 2005 |
Subverting Biometric Security Using 3D Printed Biometrics Characteristics BL Tait International Conference on Global Security, Safety, and Sustainability, 203-218, 2023 | | 2023 |