Journal articles on the topic 'Biometric access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Biometric access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohamed, El Beqqal, Azizi Mostafa, and Louis Lanet Jean. "Multimodal access control system combining RFID, fingerprint and facial recognition." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 405–13. https://doi.org/10.11591/ijeecs.v20.i1.pp405-413.
Full textYe, Shuiming, Ying Luo, Jian Zhao, and Sen-ChingS Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009, no. 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.
Full textYe, Shuiming, Ying Luo, Jian Zhao, and Sen-Ching S. Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.
Full textEl Beqqal, Mohamed, Mostafa Azizi, and Jean Louis Lanet. "Multimodal access control system combining RFID, fingerprint and facial recognition." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 405. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp405-413.
Full textTsibong, Selvia Lem. "Biometric Identification System: A Step Towards Better Crime Control in Cameroon." Scholars International Journal of Law, Crime and Justice 8, no. 06 (2025): 116–28. https://doi.org/10.36348/sijlcj.2025.v08i06.001.
Full textO. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., and Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.
Full textTroshkov, A. A., S. V. Bogdanova, A. N. Ermakova, and V. E. Rachkov. "Designing a biometric access control concept." IOP Conference Series: Materials Science and Engineering 1069, no. 1 (2021): 012028. http://dx.doi.org/10.1088/1757-899x/1069/1/012028.
Full textБуяков, К. Е., Д. А. Елизаров, М. Я. Епифанцева, Т. А. Мызникова, and А. В. Шилер. "Development of biometric access control system." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 2 (June 21, 2022): 43–51. http://dx.doi.org/10.18137/rnu.v9187.22.02.p.043.
Full textIyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. http://dx.doi.org/10.59324/ejaset.2024.2(3).18.
Full textIyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. https://doi.org/10.59324/ejaset.2024.2(3).18.
Full textSiddappa M, DR. "Paper Presentation: Protection on Exam Paper Leakage Using Biometric." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50395.
Full textSzűcs, Kata Rebeka, Arnold Őszi, and Tibor Kovács. "Mobile Biometrics and their Risks." Hadmérnök 15, no. 4 (2020): 15–28. http://dx.doi.org/10.32567/hm.2020.4.2.
Full textStrelkovskaya, Irina, Oleksiy Onatskiy, and Larysa Yona. "TWO-FACTOR AUTHENTICATION PROTOCOL IN ACCESS CONTROL SYSTEMS." Information and Telecommunication Sciences, no. 2 (December 21, 2023): 17–25. http://dx.doi.org/10.20535/2411-2976.22023.17-25.
Full textRai, Ankush, and Jagadeesh Kannan R. "SURVEY OF SOFT BIOMETRIC TECHNIQUES FOR GENDER IDENTIFICATION." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 296. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19741.
Full textH, Dr Ravishankar, Vishal Yogish Rao, Nishant Rawat, and Sindhuja Chowdhary. "Biometric Access Control: Facial Recognition & QR Code Based Security System." International Journal of Research Publication and Reviews 6, no. 2 (2025): 3585–91. https://doi.org/10.55248/gengpi.6.0225.0959.
Full textElmir, Youssef, Abdeldjalil Abdelaziz, and Mohammed Haidas. "Design and Implementation of Embedded Biometric-Based Access Control System with Electronic Lock using Raspberry Pi." Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 9, no. 2 (2023): 429–43. https://doi.org/10.26555/jiteki.v9i2.26162.
Full textBoluwatife, Christianah Abe, Olajumoke Araromi Haonat, Segun Shokenu Emmanuel, et al. "Biometric Access Control Using Voice and Fingerprint." Engineering and Technology Journal 07, no. 07 (2022): 1376–82. https://doi.org/10.5281/zenodo.6922206.
Full textOladimeji, Ismaila W., Omidiora E. Olusayo, Ismaila Folasade M., and Falohun Adeleye S.. "Multi-Level Access Control System in Automated Teller Machines." International Journal of Computer Science and Mobile Computing 10, no. 4 (2021): 146–55. http://dx.doi.org/10.47760/ijcsmc.2021.v10i04.020.
Full textKarthik, Tripurari Vinay. "Encryption of Biometric Traits to Avoid Privacy Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40945.
Full textTamirah, Sharieff, Harmain Zoya, Smyrline R. Sarah, and Noorain Shafiya. "Redefining Security- Biometric Authentication System." Journal of Advances in Cryptography and Network Security 1, no. 1 (2025): 3–8. https://doi.org/10.5281/zenodo.14874057.
Full textChandra, Akhilesh, and Thomas G. Calderon. "Toward a Biometric Security Layer in Accounting Systems." Journal of Information Systems 17, no. 2 (2003): 51–70. http://dx.doi.org/10.2308/jis.2003.17.2.51.
Full textBarthe, Dr Gilles Alonso,Marcos. "IMPROVING SECURITY AND OPERATIONAL EFFICIENCY: FACIAL RECOGNITION-BASED ACCESS CONTROL AT AL-IMAN WORKSHOP." International journal of networks and security 5, no. 3 (2025): 06–12. https://doi.org/10.55640/ijns-05-01-01.
Full textEsekhaigbe, Emmanuel, and Emmanuel O. Okoduwa. "Design and implementation of a fingerprint-based biometric access control system." Journal of Advances in Science and Engineering 7, no. 1 (2022): 18–23. http://dx.doi.org/10.37121/jase.v7i1.183.
Full textN, Nithiya. "Automatic License Checking Using Fingerprint." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3440–42. https://doi.org/10.22214/ijraset.2025.68994.
Full textWerner, Gabor, and Laszlo Hanka. "Risk-Adapted Access Control with Multimodal Biometric Identification." Interdisciplinary Description of Complex Systems 18, no. 3 (2020): 327–36. http://dx.doi.org/10.7906/indecs.18.3.1.
Full textMon, Chit Su, Amir ‘Aatieff Amir Hussin, and Toh Kai Sin. "Analyzing the periocular biometric-based access control systems." Journal of Physics: Conference Series 1529 (April 2020): 032024. http://dx.doi.org/10.1088/1742-6596/1529/3/032024.
Full textTripathi, Diwakar R., and Dipesh Kumar Nishad. "Biometric Authentication Systems: A Survey." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2878–84. http://dx.doi.org/10.61841/turcomat.v11i3.14653.
Full textOtti, Csaba, and László Hanka. "Analisys of Access Points with the Queue Model for Biometric Access Control in Large Headcount Plants." Land Forces Academy Review 24, no. 2 (2019): 164–74. http://dx.doi.org/10.2478/raft-2019-0020.
Full textGorski, Maksymilian, and Wojciech Wodo. "Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE." Cryptography 8, no. 2 (2024): 14. http://dx.doi.org/10.3390/cryptography8020014.
Full textManikis, Georgios C., Marios Spanakis, and Emmanouil G. Spanakis. "Personalized Mobile eHealth Services for Secure User Access Through a Multi Feature Biometric Framework." International Journal of Reliable and Quality E-Healthcare 8, no. 1 (2019): 40–51. http://dx.doi.org/10.4018/ijrqeh.2019010104.
Full textRassolov, I. M., S. G. Chubukova, and I. V. Mikurova. "Biometrics in the Context of Personal Data and Genetic Information: Legal Issues." Lex Russica, no. 1 (January 1, 2019): 108–18. http://dx.doi.org/10.17803/1729-5920.2019.146.1.108-118.
Full textKalbande, Yash A., and Prof. Snehal V. Raut. "Study of Biometric World." International Journal of Ingenious Research, Invention and Development (IJIRID) 3, no. 6 (2024): 593–98. https://doi.org/10.5281/zenodo.14555667.
Full textRaia, Maria, Thomas Stogiannopoulos, Nikolaos Mitianoudis, and Nikolaos V. Boulgouris. "Person Identification Using Temporal Analysis of Facial Blood Flow." Electronics 13, no. 22 (2024): 4499. http://dx.doi.org/10.3390/electronics13224499.
Full textx, Bisiriyu, Akeem Olawale, Olawale x, and Babatunde Olumide. "Sequential Face and Voice Biometric System for Access Control into a Security Safe." International Journal of Science and Research (IJSR) 11, no. 6 (2022): 1234–38. http://dx.doi.org/10.21275/sr22528120038.
Full textSalama, Gerges M., Safaa El-Gazar, Basma Omar, et al. "Cancelable biometric system for IoT applications based on optical double random phase encoding." Optics Express 30, no. 21 (2022): 37816. http://dx.doi.org/10.1364/oe.466101.
Full textAbundiz-Pérez, F., C. Cruz-Hernández, M. A. Murillo-Escobar, R. M. López-Gutiérrez, and A. Arellano-Delgado. "A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map." Mathematical Problems in Engineering 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/2670494.
Full textGaikwad, Aditya, Vaishanavi Bundele, Diksha Borade, and Sayali Nannaware. "Advancements in ATM Security: A Biometric Approach for Fingerprint and Face Recognition Access Control System." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 1284–87. http://dx.doi.org/10.22214/ijraset.2024.58159.
Full textRajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.
Full textJ, Paul Rajasingh, and Sai Yaswanth D. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 5 (2021): 87–89. https://doi.org/10.35940/ijeat.E2651.0610521.
Full textBoluma Mangata, Bopatriciat, Dominique Ilunga Nakashama, Donatien Kadima Muamba, and Parfum Bukanga Christian. "Implementation of an access control system based on bimodal biometrics with fusion of global decisions: Application to facial recognition and fingerprints." Journal of Computing Research and Innovation 7, no. 2 (2022): 43–53. http://dx.doi.org/10.24191/jcrinn.v7i2.289.
Full textMcAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of Biometrics and Steganography: A Comprehensive Review." Technologies 7, no. 2 (2019): 34. http://dx.doi.org/10.3390/technologies7020034.
Full textShabala, Yevheniia, Borys Korniichuk, and Dmytro Humennyi. "Disadvantages of using biometric identifiers in access restriction systems." Management of Development of Complex Systems, no. 59 (September 27, 2024): 131–37. http://dx.doi.org/10.32347/2412-9933.2024.59.131-137.
Full textNWOYE, Chinedu J. "Cybercrime Prevention in Online Transaction Using Biometric Access Control." International Journal of Information Security and Cybercrime 4, no. 2 (2015): 61–72. http://dx.doi.org/10.19107/ijisc.2015.02.06.
Full textJones, Lynne Norris. "Biometric access control in the workplace: benefit or bind?" International Journal of Information Technology and Management 11, no. 1/2 (2012): 61. http://dx.doi.org/10.1504/ijitm.2012.044064.
Full textB, Smitha Shekar, Harish G, Aaditya Pandit, Abdul Rayan, Abhishek Singha, and Binyul Shrestha. "IoT based Biometric Student Access Control and Attendance Management." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5730–35. http://dx.doi.org/10.22214/ijraset.2024.61370.
Full textQilichev, Elmurad Jamuradovich, Baxodir Saydullaevich Achilov, Ismoil Ergash oʻgʻli Isroilov, and Mirshod Mirkomil o'g'li Ahmadov. "SECURITY IN BIOMETRIC ACCESS CONTROL SYSTEMS BASED ON FINGERPRINTS." Chemical Technology, Control and Management 2025, no. 2 (2025): 73–83. https://doi.org/10.59048/2181-1105.1667.
Full textOMOTOSHO, LAWRENCE, IBRAHIM OGUNDOYIN, OLAJIDE ADEBAYO, and JOSHUA OYENIYI. "AN ENHANCED MULTIMODAL BIOMETRIC SYSTEM BASED ON CONVOLUTIONAL NEURAL NETWORK." Journal of Engineering Studies and Research 27, no. 2 (2021): 73–81. http://dx.doi.org/10.29081/jesr.v27i2.276.
Full textAlkasimi, Ahmad, Tyler Shepard, Samuel Wagner, et al. "Dual-Biometric Human Identification Using Radar Deep Transfer Learning." Sensors 22, no. 15 (2022): 5782. http://dx.doi.org/10.3390/s22155782.
Full textZyryanova, Svetlana A., Yuliya Yu Vassunova, and Irina V. Chumak. "INNOVATIVE AUTHENTICATION AND ACCESS CONTROL TECHNOLOGIES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4/9, no. 145 (2024): 115–21. http://dx.doi.org/10.36871/ek.up.p.r.2024.04.09.018.
Full textBOLUMA MANGATA, Bopatriciat, Odette Sangupamba Mwilu, Patience Ryan Tebua Tene, and Gilgen Mate Landry. "Evaluation of two biometric access control systems using the Susceptible-Infected-Recovered model." Journal of Electronics, Electromedical Engineering, and Medical Informatics 5, no. 2 (2023): 119–24. http://dx.doi.org/10.35882/jeemi.v5i2.288.
Full text