Academic literature on the topic 'Biometry. Computer security. Computers Computer software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometry. Computer security. Computers Computer software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Biometry. Computer security. Computers Computer software"
Chinwe C, Ibebuogu, Philip Seth, and Anyaduba Obiageli J. "Biometric Authentication System Using Face Geometry." International Journal of Engineering and Computer Science 8, no. 08 (2019): 24805–13. http://dx.doi.org/10.18535/ijecs/v8i08.4332.
Full textZhifang Wang, Shuangshuang Wang, and Qun Ding. "Security of Multimodal Biometric Fusion System." International Journal of Digital Content Technology and its Applications 5, no. 4 (2011): 264–70. http://dx.doi.org/10.4156/jdcta.vol5.issue4.32.
Full textХайдаров, Александр Александрович, Сергей Александрович Бодячевский, and Николай Николаевич Толстых. "RISK ASSESSMENT OF SUCCESSFUL IMPLEMENTATION OF SPOOFING ATTACKS ON VOICE AUTHENTICATION ELEMENTS IN DISTRIBUTED COMPUTER SYSTEMS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 9, 2021): 115–26. http://dx.doi.org/10.36622/vstu.2021.24.1.011.
Full textMilinković, Milorad, Miroslav Minović, and Miloš Milovanović. "Applying Technical Standards to Biometric Systems." International Journal of Decision Support System Technology 8, no. 2 (2016): 50–59. http://dx.doi.org/10.4018/ijdsst.2016040104.
Full textSingleton, Tommie. "Biometric Security Systems: The Best Infosec Solution?" EDPACS 30, no. 9 (2003): 1–24. http://dx.doi.org/10.1201/1079/43292.30.9.20030301/41230.1.
Full textSmiatacz, Maciej, and Bogdan Wiszniewski. "Just look at to open it up:." Multimedia Tools and Applications 80, no. 13 (2021): 20089–124. http://dx.doi.org/10.1007/s11042-021-10533-8.
Full textPaul, Padma P., and Marina L. Gavrilova. "Cancelable Fusion of Face and Ear for Secure Multi-Biometric Template." International Journal of Cognitive Informatics and Natural Intelligence 7, no. 3 (2013): 80–94. http://dx.doi.org/10.4018/ijcini.2013070105.
Full textYadav, Amit Kumar, Neeraj Gupta, Aamir Khan, and Anand Singh Jalal. "Robust Face Recognition Under Partial Occlusion Based on Local Generic Features." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 3 (2021): 47–57. http://dx.doi.org/10.4018/ijcini.20210701.oa4.
Full textVigila, Soosai Antony Maria Celestin, Karuppiah Muneeswaran, and William Thomas Berkin Albert Antony. "Biometric security system over finite field for mobile applications." IET Information Security 9, no. 2 (2015): 119–26. http://dx.doi.org/10.1049/iet-ifs.2013.0286.
Full textHassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Full textDissertations / Theses on the topic "Biometry. Computer security. Computers Computer software"
Mahadevan, Karthikeyan. "Estimating reliability impact of biometric devices in large scale applications." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3096.
Full textFuller, Marvin G. "Technological enhancements for personal computers." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA247962.
Full textJulian, Donald P. "Delaying-type responses for use by software decoys." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FJulian.pdf.
Full textTaramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.
Full textShonola, Shaibu A. "Mobile learning security in Nigeria." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/98529/.
Full textJackson, Jennifer T. "A biodiversity approach to cyber security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/106820/.
Full textKatsikas, Stamatios. "Game theoretic models of networks security." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102611/.
Full textAlAdraj, Resala A. "Security and collaborative groupware tools usage." Thesis, University of Warwick, 2015. http://wrap.warwick.ac.uk/73319/.
Full textFragkos, Georgios. "An event-trace language for software decoys." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFragkos.pdf.
Full textTsigkritis, Theocharis. "Diagnosing runtime violations of security and dependability properties." Thesis, City University London, 2010. http://openaccess.city.ac.uk/1181/.
Full textBooks on the topic "Biometry. Computer security. Computers Computer software"
1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.
Find full textSecurity matters: Getting software security right with static analysis. Addison-Wesley, 2007.
Find full textSteve, Lipner, ed. The security development lifecycle: SDL, a process for developing demonstrably more secure software. Microsoft Press, 2006.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Find full textKumar, Ajay. Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers. Springer-Verlag Berlin Heidelberg, 2010.
Find full textA, Garay Juan, ed. Information security: 10th international conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007 : proceedings. Springer, 2007.
Find full textParker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. Icon Group International, 2007.
Find full textBook chapters on the topic "Biometry. Computer security. Computers Computer software"
Pulkkis, Göran, Kaj J. Grahn, and Jonny Karlsson. "Taxonomies of User-Authentication Methods in Computer Networks." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch054.
Full textCooper, J. Arlin, and Anna M. Johnston. "Computer and Communications Security." In Computers, Software Engineering, and Digital Devices. CRC Press, 2018. http://dx.doi.org/10.1201/9781315220659-19.
Full textAdogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.
Full textGaruba, Abdul Rahman. "Computer Virus Phenomena in Cybercafé." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch012.
Full textBaecker, Ronald M. "Security." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0013.
Full textAjewole, Ayotokunbo I. "Software Requirements for Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch009.
Full textChen, Thomas M., and Gregg W. Tally. "Malicious Software." In Software Applications. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-060-8.ch030.
Full textChen, Thomas M., and Gregg W. Tally. "Malicious Software." In Encyclopedia of Internet Technologies and Applications. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch041.
Full textAdogbeji, Oghenevwogaga Benson, and Esharenana E. Adomi. "Computer Networking of Cybercafés in Delta State, Nigeria." In Database Technologies. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-058-5.ch087.
Full textBaecker, Ronald M. "Safety." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0014.
Full textConference papers on the topic "Biometry. Computer security. Computers Computer software"
Yanushkevich, Svetlana N., and Anna V. Shmerko. "Fundamentals of Biometric System Design: New Course for Electrical, Computer, and Software Engineering Students." In 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security (BLISS). IEEE, 2009. http://dx.doi.org/10.1109/bliss.2009.27.
Full textWISSEMAN, W., and DAVID GOBUTY. "A method for software implementation of computer security policy enforcement mechanisms." In 7th Computers in Aerospace Conference. American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3133.
Full textBalakrishnan, Bhargav. "Software Framework for Authorized and Unauthorized Users in an Organization & Maintain High Security for IT Gadgets and Data (Using Encryption, Biometric, Bar Code)." In 2010 Second International Conference on Computer Engineering and Applications. IEEE, 2010. http://dx.doi.org/10.1109/iccea.2010.216.
Full textLin, Po Ting, and Yu-Cheng Chou. "Principles on Collaborations in Cloud-Aided X (CLAX)." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12882.
Full textRöhl, Peter J., Raymond M. Kolonay, Michael J. Paradis, and Michael W. Bailey. "Intelligent Compressor Design in a Network-Centric Environment." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/cie-21667.
Full text"An Examination of Gen Z Learners Attending a Minority University." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/3955.
Full text