A Ross, AK Jain - Ann. Des Télécommunications, 2007 - academia.edu
Establishing identity is becoming critical in our vastly interconnected society. Questions such as “Is she really who she claims to be?,”“Is this person authorized to use this facility?,” or “Is …
AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications …
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses …
Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing …
AP Pons, P Polak - Communications of the ACM, 2008 - dl.acm.org
Biometric technology, mainly used today in security sensitive organizations like governments and financial institutions, is soon expected to play an increasing role in all …
A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such …
MP Down, RJ Sands - Information Systems Control Journal, 2004 - Citeseer
Information Systems Control Journal, Volume 4, 2004 help overcome limitations of single biometric solutions, such as when a user does not have a quality biometric sample to …
S Liu, M Silverman - IT Professional, 2001 - ieeexplore.ieee.org
As organizations search for more secure authentication methods for user access, e- commerce. and other security applications, biometrics is gaining increasing attention. But …
AK Jain, A Kumar - Second generation biometrics, 2010 - Citeseer
Prevailing methods of human identification based on credentials (identification documents and PIN) are not able to meet the growing demands for stringent security in applications …