Biometric technologies and their perception by the common citizen
暂无分享,去创建一个
[1] Eiji Okamoto,et al. A User Identification System Using Signature Written with Mouse , 1998, ACISP.
[2] Lurdes Faria,et al. Multimodal cognitive biometrics , 2011, 6th Iberian Conference on Information Systems and Technologies (CISTI 2011).
[3] Faith-Michael E. Uzoka,et al. Empirical analysis of biometric technology adoption and acceptance in Botswana , 2009, J. Syst. Softw..
[4] Paulo Sérgio Tenreiro Magalhães. Estudo de viabilidade da utilização de tecnologias biométricas comportamentais na autenticação do cidadão perante os serviços electrónicos do Estado , 2009 .
[5] Norman Poh,et al. Hybrid Biometric Person Authentication Using Face and Voice Features , 2001, AVBPA.
[6] N L Browse,et al. Transcranial Doppler measurement of middle cerebral artery blood flow velocity: a validation study. , 1986, Stroke.
[7] G. Aguilar,et al. Fingerprint Recongnition Using Espatial Minutae Information , 2008, 2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08).
[8] Praveen Ranjan Srivastava,et al. An integrated authentication framework based on multi-tier biometrics , 2011, Int. J. Biom..
[9] Christoph Busch,et al. Non-Forensic Odontological Biometrics , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[10] S. Liu,et al. A practical guide to biometric security technology , 2001 .
[11] Kenneth Revett,et al. Keystroke dynamics - stepping forward in authentication , 2006 .
[12] Steve Drew,et al. Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia , 2009, I3E.
[13] Chaouki Kasmi,et al. Voice Biometrics , 2011, Encyclopedia of Cryptography and Security.
[14] Yong Haur Tay,et al. A review of iris recognition algorithms , 2008, 2008 International Symposium on Information Technology.
[15] Sunil Kumar Singla,et al. ECG as Biometric in the Automated World , 2010 .
[16] Rain Ottis,et al. Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective , 2008 .