Biometrics, is it a viable proposition for identity authentication and access control?
暂无分享,去创建一个
[1] Steve New,et al. Information Systems Management: Opportunities and Risks , 1991 .
[2] C T Dinardo,et al. Computers and security , 1986 .
[3] T. Forester,et al. Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .
[4] W. Caelli,et al. Information Security Handbook , 1991 .
[5] Gopal K. Gupta,et al. Identity authentication based on keystroke latencies , 1990, Commun. ACM.
[6] Ellis Booker. Retinal scanners eye-dentify inmates , 1992 .
[7] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[8] Daryl H. Graf,et al. An introduction to speech and speaker recognition , 1990, Computer.
[9] Klaus Dittrich. COMPUTER SECURITY AND INFORMATION INTEGRITY , 1991 .
[10] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[11] Robin L. Sherman. Biometrics futures , 1992, Comput. Secur..
[12] Martin Wasik. Crime and the computer , 1990 .
[13] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[14] Marc Rotenberg,et al. Protecting privacy , 1992, CACM.