Internet Security Using Biometrics

[1]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[2]  Rama Chellappa,et al.  Handbook of Remote Biometrics , 2009, Advances in Pattern Recognition.

[3]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[4]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[5]  Nalini K. Ratha,et al.  Biometrics break-ins and band-aids , 2003, Pattern Recognit. Lett..

[6]  J. L. Wayman,et al.  Best practices in testing and reporting performance of biometric devices. , 2002 .

[7]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[8]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[9]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Radia Perlman,et al.  Network Security , 2002 .

[11]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[12]  Gerhard Eschelbeck Active Security - A proactive approach for computer security systems , 2000, J. Netw. Comput. Appl..

[13]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[14]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..