Biometrics: a tool for information security

AK Jain, A Ross, S Pankanti - IEEE transactions on information …, 2006 - ieeexplore.ieee.org
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as" Is she really who she claims to be?,"" Is this person authorized to use this facility?," or" Is …

[PDF][PDF] Human recognition using biometrics: an overview.

A Ross, AK Jain - Ann. Des Télécommunications, 2007 - academia.edu
Establishing identity is becoming critical in our vastly interconnected society. Questions such
as “Is she really who she claims to be?,”“Is this person authorized to use this facility?,” or “Is …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

[图书][B] Biometric technologies and verification systems

JR Vacca - 2007 - books.google.com
Biometric Technologies and Verification Systems is organized into nine parts composed of
30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …

Biometric recognition: Security and privacy concerns

S Prabhakar, S Pankanti, AK Jain - IEEE security & privacy, 2003 - ieeexplore.ieee.org
Biometrics offers greater security and convenience than traditional methods of personal
recognition. In some applications, biometrics can replace or supplement the existing …

[HTML][HTML] Understanding user perspectives on biometric technology

AP Pons, P Polak - Communications of the ACM, 2008 - dl.acm.org
Biometric technology, mainly used today in security sensitive organizations like
governments and financial institutions, is soon expected to play an increasing role in all …

An introduction to biometric recognition

AK Jain, A Ross, S Prabhakar - IEEE Transactions on circuits …, 2004 - ieeexplore.ieee.org
A wide variety of systems requires reliable personal recognition schemes to either confirm or
determine the identity of an individual requesting their services. The purpose of such …

[PDF][PDF] Biometrics: An overview of the technology, challenges and control considerations

MP Down, RJ Sands - Information Systems Control Journal, 2004 - Citeseer
Information Systems Control Journal, Volume 4, 2004 help overcome limitations of single
biometric solutions, such as when a user does not have a quality biometric sample to …

A practical guide to biometric security technology

S Liu, M Silverman - IT Professional, 2001 - ieeexplore.ieee.org
As organizations search for more secure authentication methods for user access, e-
commerce. and other security applications, biometrics is gaining increasing attention. But …

[PDF][PDF] Biometrics of next generation: An overview

AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …