Physiological Biometric Authentication Systems Advantages Disadvantages And Future Development A Review
暂无分享,去创建一个
[1] S. Liu,et al. A practical guide to biometric security technology , 2001 .
[2] Marcos Faúndez-Zanuy,et al. Biometric security technology , 2006, IEEE Aerospace and Electronic Systems Magazine.
[3] Naser Zaeri,et al. Minutiae-based Fingerprint Extraction and Recognition , 2011 .
[4] Ram B. Joshi,et al. Highly Secure Authentication Scheme , 2015, 2015 International Conference on Computing Communication Control and Automation.
[5] Svetlana N. Yanushkevich,et al. Synthetic Biometrics: A Survey , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.
[6] Alexander Eng,et al. Look into My Eyes: A Survey of Biometric Security , 2013, 2013 10th International Conference on Information Technology: New Generations.
[7] H.V. Poor,et al. Privacy-security tradeoffs in biometric security systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[8] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Keerti Arse. A Survey of Automated Biometric Authentication Techniques , 2014 .
[10] Steven Furnell,et al. Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.
[11] M. Grgic,et al. A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.
[12] Shambhu J. Upadhyaya,et al. Continuous Authentication Using Behavioral Biometrics , 2017, IWSPA@CODASPY.
[13] Gunjan Pahuja,et al. Biometric authentication & identification through behavioral biometrics: A survey , 2015, 2015 International Conference on Cognitive Computing and Information Processing(CCIP).
[14] Stark C. Draper,et al. A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems , 2011, IEEE Transactions on Information Forensics and Security.
[15] Rabul Hussain Laskar,et al. Study on biometric authentication systems, challenges and future trends: A review , 2013 .
[16] Qinghan Xiao,et al. Technology review - Biometrics-Technology, Application, Challenge, and Computational Intelligence Solutions , 2007, IEEE Computational Intelligence Magazine.