The intention of passengers towards repeat use of biometric security for sustainable airport management

C Kim, KC Lee, FJ Costello - Sustainability, 2020 - mdpi.com
… However, if the first experience from biometric security is somewhat … ’ repeat use intentions
of biometric security, such as the perceived benefits, perceived risks, and initial use intention. …

Biometric authentication—security and usability

V Matyáš, Z Říha - Advanced Communications and Multimedia Security …, 2002 - Springer
… So why do not we use biometrics everywhere instead of … Data acquisition must be repeated
if the quality of input sample … Biometric data are not considered to be secret and security of a …

A theoretical analysis of authentication, privacy, and reusability across secure biometric systems

Y Wang, S Rane, SC Draper… - … Forensics and Security, 2012 - ieeexplore.ieee.org
… to the enrollment biometric. This is a major security hazard; the attacker can subsequently
use the enrollment biometric to gain repeated access to the system, and to any other biometric-…

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
… The image resulting in an improved match score is retained and this process is repeated in
… Jain and Uludag [13] suggest the use of steganography principles to hide biometric data (eg, …

Biometric authentication in infrastructure security

J Armington, P Ho, P Koznek, R Martinez - … on Infrastructure Security, 2002 - Springer
… of security and simplifies authentication for end users while preserving privacy. Speaker
Verification is the most natural biometric technology to use … are prompted to repeat a onetime …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
… investigations to identify suspects and repeat criminals. Now, … system security concerns
deals with biometric template security. … We use the term first generation biometric systems to …

An introduction evaluating biometric systems

PJ Phillips, A Martin, CL Wilson, M Przybocki - Computer, 2000 - ieeexplore.ieee.org
… For example, if you plan to use a biometric to reduce—as … an existing security system with
a biometric-based one may … field conditions, they cannot be repeated. You can only attempt to …

[HTML][HTML] Biometric Technologies: Security, legal, and policy implications

P Rosenzweig, A Kochems, A Schwartz - Legal Memorandum, 2004 - heritage.org
… systems withappropriate safeguards will help avoid repeating this mistake. … As a
consequence, we also support the need for legislative authorization for many biometric uses. This …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
… investigations to identify suspects and repeat criminals. Now, … We use the term first generation
biometric systems to … that can make the whole biometric security system ineffective [44]. …

Biometric-based human recognition systems: an overview

D Palma, PL Montessoro - Recent Advances in Biometrics, 2022 - books.google.com
… exploited to compromise the security of a biometric system. Finally, … Biological biometrics
make use of traits at a genetic and … (STR) 1 analysis, which is used to compare allele repeats at …