[PDF][PDF] Biometric authentication: System security and user privacy.

AK Jain, K Nandakumar - Computer, 2012 - biometrics.cse.msu.edu
US Federal Trade Commission reports that ID theft affects millions of innocent victims each
year and is the most common consumer complaint (www. ftc. gov/opa/reporter/idtheft/index …

An introduction to biometric authentication systems

J Wayman, A Jain, D Maltoni, D Maio - Biometric systems: Technology …, 2005 - Springer
Immigration cards holding both passport number and measures of the user's hand [1];
fingerprints taken as a legal requirement for a driver license, but not stored anywhere on the …

A practical guide to biometric security technology

S Liu, M Silverman - IT Professional, 2001 - ieeexplore.ieee.org
As organizations search for more secure authentication methods for user access, e-
commerce. and other security applications, biometrics is gaining increasing attention. But …

Biometric authentication

AC Weaver - Computer, 2006 - ieeexplore.ieee.org
In this age of digital impersonation, biometric techniques are being used increasingly as a
hedge against identity theft. The premise is that a biometric-a measurable physical …

Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

[PDF][PDF] Biometrics—technologies for highly secure personal authentication

FL Podio - National Institute of Standards and Technology, http …, 2001 - femto-second.com
Biometrics are automated methods of identifying a person or verifying the identity of a
person based on a physiological or behavioral characteristic. Examples of physiological …

Biometric recognition: Security and privacy concerns

S Prabhakar, S Pankanti, AK Jain - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Biometrics offers greater security and convenience than traditional methods of personal
recognition. In some applications, biometrics can replace or supplement the existing …

[图书][B] Biometric technologies and verification systems

JR Vacca - 2007 - books.google.com
Biometric Technologies and Verification Systems is organized into nine parts composed of
30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …

[图书][B] Implementing biometric security

J Chirillo, S Blaul - 2003 - dl.acm.org
From the Publisher: Get the specific guidelines, applications, and procedures for
implementing a biometric security system-straight from the experts As threats to vital data …

Biometrics in identity management systems

JL Wayman - IEEE Security & Privacy, 2008 - ieeexplore.ieee.org
Biometric technology-the automated recognition of individuals using biological and
behavioral traits-has been presented as a natural identity management tool that offers" …