Journal articles on the topic 'Biometry. Computer security. Computers Computer software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Biometry. Computer security. Computers Computer software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chinwe C, Ibebuogu, Philip Seth, and Anyaduba Obiageli J. "Biometric Authentication System Using Face Geometry." International Journal of Engineering and Computer Science 8, no. 08 (2019): 24805–13. http://dx.doi.org/10.18535/ijecs/v8i08.4332.
Full textZhifang Wang, Shuangshuang Wang, and Qun Ding. "Security of Multimodal Biometric Fusion System." International Journal of Digital Content Technology and its Applications 5, no. 4 (2011): 264–70. http://dx.doi.org/10.4156/jdcta.vol5.issue4.32.
Full textХайдаров, Александр Александрович, Сергей Александрович Бодячевский, and Николай Николаевич Толстых. "RISK ASSESSMENT OF SUCCESSFUL IMPLEMENTATION OF SPOOFING ATTACKS ON VOICE AUTHENTICATION ELEMENTS IN DISTRIBUTED COMPUTER SYSTEMS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 9, 2021): 115–26. http://dx.doi.org/10.36622/vstu.2021.24.1.011.
Full textMilinković, Milorad, Miroslav Minović, and Miloš Milovanović. "Applying Technical Standards to Biometric Systems." International Journal of Decision Support System Technology 8, no. 2 (2016): 50–59. http://dx.doi.org/10.4018/ijdsst.2016040104.
Full textSingleton, Tommie. "Biometric Security Systems: The Best Infosec Solution?" EDPACS 30, no. 9 (2003): 1–24. http://dx.doi.org/10.1201/1079/43292.30.9.20030301/41230.1.
Full textSmiatacz, Maciej, and Bogdan Wiszniewski. "Just look at to open it up:." Multimedia Tools and Applications 80, no. 13 (2021): 20089–124. http://dx.doi.org/10.1007/s11042-021-10533-8.
Full textPaul, Padma P., and Marina L. Gavrilova. "Cancelable Fusion of Face and Ear for Secure Multi-Biometric Template." International Journal of Cognitive Informatics and Natural Intelligence 7, no. 3 (2013): 80–94. http://dx.doi.org/10.4018/ijcini.2013070105.
Full textYadav, Amit Kumar, Neeraj Gupta, Aamir Khan, and Anand Singh Jalal. "Robust Face Recognition Under Partial Occlusion Based on Local Generic Features." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 3 (2021): 47–57. http://dx.doi.org/10.4018/ijcini.20210701.oa4.
Full textVigila, Soosai Antony Maria Celestin, Karuppiah Muneeswaran, and William Thomas Berkin Albert Antony. "Biometric security system over finite field for mobile applications." IET Information Security 9, no. 2 (2015): 119–26. http://dx.doi.org/10.1049/iet-ifs.2013.0286.
Full textHassan, Basma Mohammed, Khaled Mohammed Fouad, and Mahmoud Fathy Hassan. "Keystroke Dynamics Authentication in Cloud Computing." International Journal of Enterprise Information Systems 11, no. 4 (2015): 99–120. http://dx.doi.org/10.4018/ijeis.2015100105.
Full textDeane, Frank, Ron Henderson, Doug Mahar, and Anthony Saliba. "Theoretical examination of the effects of anxiety and electronic performance monitoring on behavioural biometric security systems." Interacting with Computers 7, no. 4 (1995): 395–411. http://dx.doi.org/10.1016/0953-5438(96)87700-9.
Full textKanak, Alper. "Biometric ontology for semantic biometric‐as‐a‐service (BaaS) applications: a border security use case." IET Biometrics 7, no. 6 (2018): 510–18. http://dx.doi.org/10.1049/iet-bmt.2018.5067.
Full textSoutar, Colin. "Implementation of Biometric Systems — Security and Privacy Considerations." Information Security Technical Report 7, no. 4 (2002): 49–55. http://dx.doi.org/10.1016/s1363-4127(02)00406-5.
Full textDas, Srijan, Khan Muhammad, Sambit Bakshi, et al. "Lip biometric template security framework using spatial steganography." Pattern Recognition Letters 126 (September 2019): 102–10. http://dx.doi.org/10.1016/j.patrec.2018.06.026.
Full textWati, Vera, Kusrini Kusrini, Hanif Al Fatta, and Nitika Kapoor. "Security of facial biometric authentication for attendance system." Multimedia Tools and Applications 80, no. 15 (2021): 23625–46. http://dx.doi.org/10.1007/s11042-020-10246-4.
Full textBiggio, B., Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli. "Security evaluation of biometric authentication systems under real spoofing attacks." IET Biometrics 1, no. 1 (2012): 11. http://dx.doi.org/10.1049/iet-bmt.2011.0012.
Full textSarkar, Arpita, and Binod K. Singh. "A review on performance,security and various biometric template protection schemes for biometric authentication systems." Multimedia Tools and Applications 79, no. 37-38 (2020): 27721–76. http://dx.doi.org/10.1007/s11042-020-09197-7.
Full textCHOU, I.-HSIN, and CHIN-FENG FAN. "AN OBJECT-ORIENTED SECURITY KNOWLEDGE FRAMEWORK FOR THE NUCLEAR SAFETY SYSTEM PROJECT." International Journal of Software Engineering and Knowledge Engineering 20, no. 03 (2010): 347–65. http://dx.doi.org/10.1142/s0218194010004797.
Full textBallard, Lucas, Daniel Lopresti, and Fabian Monrose. "Forgery Quality and Its Implications for Behavioral Biometric Security." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 37, no. 5 (2007): 1107–18. http://dx.doi.org/10.1109/tsmcb.2007.903539.
Full textSiconolfi, Richard M. "A Toxicologist's Viewpoint of the Quality of Computer-Captured Data and Data Audits." Journal of the American College of Toxicology 8, no. 2 (1989): 323–31. http://dx.doi.org/10.3109/10915818909019557.
Full textJoshi, Mahesh, Bodhisatwa Mazumdar, and Somnath Dey. "A comprehensive security analysis of match-in-database fingerprint biometric system." Pattern Recognition Letters 138 (October 2020): 247–66. http://dx.doi.org/10.1016/j.patrec.2020.07.024.
Full textQuadry, Khaja Mizbahuddin, A. Govardhan, and Mohammed Misbahuddin. "Design, Analysis, and Implementation of a Twofactor Authentication Scheme using Graphical Password." International Journal of Computer Network and Information Security 13, no. 3 (2021): 39–51. http://dx.doi.org/10.5815/ijcnis.2021.03.04.
Full textVerma, Dipti, and Sipi Dubey. "Fuzzy Brain Storm Optimization and Adaptive Thresholding for Multimodal Vein-Based Recognition System." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 05 (2017): 1756007. http://dx.doi.org/10.1142/s0218001417560079.
Full textChandra, Akhilesh, and Thomas G. Calderon. "Toward a Biometric Security Layer in Accounting Systems." Journal of Information Systems 17, no. 2 (2003): 51–70. http://dx.doi.org/10.2308/jis.2003.17.2.51.
Full textKonyeha, Susan, and Emmanuel A. Onibere. "Computer Immunity Using an Intrusion Detection System (IDS)." Advanced Materials Research 824 (September 2013): 200–205. http://dx.doi.org/10.4028/www.scientific.net/amr.824.200.
Full textGumaei, Abdu, Rachid Sammouda, Abdul Malik S. Al-Salman, and Ahmed Alsanad. "Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation." Journal of Parallel and Distributed Computing 124 (February 2019): 27–40. http://dx.doi.org/10.1016/j.jpdc.2018.10.005.
Full textAli, Syed Sadaf, Iyyakutti Iyappan Ganapathi, Surya Prakash, Pooja Consul, and Sajid Mahyo. "Securing biometric user template using modified minutiae attributes." Pattern Recognition Letters 129 (January 2020): 263–70. http://dx.doi.org/10.1016/j.patrec.2019.11.037.
Full textEvangelin, L. Nisha, and A. Lenin Fred. "Securing recognized multimodal biometric images using cryptographic model." Multimedia Tools and Applications 80, no. 12 (2021): 18735–52. http://dx.doi.org/10.1007/s11042-021-10541-8.
Full textMiao, Fen, Shu-Di Bao, and Ye Li. "Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security." IET Information Security 7, no. 2 (2013): 87–96. http://dx.doi.org/10.1049/iet-ifs.2012.0104.
Full textBhatnagar, Gaurav, and Q. M. Jonathan Wu. "Enhancing the transmission security of biometric images using chaotic encryption." Multimedia Systems 20, no. 2 (2013): 203–14. http://dx.doi.org/10.1007/s00530-013-0323-3.
Full textYang, Wencheng, Song Wang, Guanglou Zheng, Junaid Chaudhry, and Craig Valli. "ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures." Journal of Supercomputing 74, no. 10 (2018): 4893–909. http://dx.doi.org/10.1007/s11227-018-2266-0.
Full textNagar, Abhishek, Karthik Nandakumar, and Anil K. Jain. "A hybrid biometric cryptosystem for securing fingerprint minutiae templates." Pattern Recognition Letters 31, no. 8 (2010): 733–41. http://dx.doi.org/10.1016/j.patrec.2009.07.003.
Full textLiu, Haiqing, Shiqiang Zheng, Shuhua Hao, and Yuancheng Li. "Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication." Advances in Multimedia 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/9025458.
Full textCruz, Bruno, Silvana Gómez-Meire, David Ruano-Ordás, Helge Janicke, Iryna Yevseyeva, and Jose R. Méndez. "A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets." Scientific Programming 2019 (July 29, 2019): 1–11. http://dx.doi.org/10.1155/2019/9067512.
Full textScott, Ralph L. "Wired to the World: Anti-virus Software." North Carolina Libraries 62, no. 1 (2009): 63. http://dx.doi.org/10.3776/ncl.v62i1.157.
Full textRevathi, A., N. Sasikaladevi, and C. Jeyalakshmi. "Digital speech watermarking to enhance the security using speech as a biometric for person authentication." International Journal of Speech Technology 21, no. 4 (2018): 1021–31. http://dx.doi.org/10.1007/s10772-018-09563-9.
Full textBhatnagar, Gaurav, Jonathan Wu, and Balasubramanian Raman. "Fractional dual tree complex wavelet transform and its application to biometric security during communication and transmission." Future Generation Computer Systems 28, no. 1 (2012): 254–67. http://dx.doi.org/10.1016/j.future.2010.11.012.
Full textHathaliya, Jigna J., Sudeep Tanwar, and Richard Evans. "Securing electronic healthcare records: A mobile-based biometric authentication approach." Journal of Information Security and Applications 53 (August 2020): 102528. http://dx.doi.org/10.1016/j.jisa.2020.102528.
Full textRoss, Arun, Sudipta Banerjee, and Anurag Chowdhury. "Security in smart cities: A brief review of digital forensic schemes for biometric data." Pattern Recognition Letters 138 (October 2020): 346–54. http://dx.doi.org/10.1016/j.patrec.2020.07.009.
Full textZakaria, Y., Rana M. Nassar, Osama Zahran, et al. "Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis." Multimedia Tools and Applications 78, no. 22 (2019): 32333–55. http://dx.doi.org/10.1007/s11042-019-07824-6.
Full textPunithavathi, P., and S. Geetha. "Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications." Multimedia Tools and Applications 78, no. 18 (2019): 25487–514. http://dx.doi.org/10.1007/s11042-019-7617-1.
Full textVijay, M., and G. Indumathi. "Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications." Journal of Information Security and Applications 58 (May 2021): 102707. http://dx.doi.org/10.1016/j.jisa.2020.102707.
Full textMamyrbayev, Orken, Aizat Kydyrbekova, Keylan Alimhan, Dina Oralbekova, Bagashar Zhumazhanov, and Bulbul Nuranbayeva. "Development of security systems using DNN and i & x-vector classifiers." Eastern-European Journal of Enterprise Technologies 4, no. 9(112) (2021): 32–45. http://dx.doi.org/10.15587/1729-4061.2021.239186.
Full textRamkumar, E., T. Guna, S. M. Dharshan, and V. S. Ashok Ramanan. "Implementing Facial Recognition by Interfacing MATLAB Along with Arduino." International Journal of Innovative Technology and Exploring Engineering 10, no. 4 (2021): 66–71. http://dx.doi.org/10.35940/ijitee.d8478.0210421.
Full textUNE, M., A. OTSUKA, and H. IMAI. "Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems." IEICE Transactions on Information and Systems E91-D, no. 5 (2008): 1380–89. http://dx.doi.org/10.1093/ietisy/e91-d.5.1380.
Full textCHEN, XUERONG, and ZHONGLIANG JING. "INFRARED FACE RECOGNITION BASED ON LOG-GABOR WAVELETS." International Journal of Pattern Recognition and Artificial Intelligence 20, no. 03 (2006): 351–60. http://dx.doi.org/10.1142/s0218001406004703.
Full textVlădoiu, Monica, and Zoran Constantinescu. "Development Journey of QADPZ - A Desktop Grid Computing Platform." International Journal of Computers Communications & Control 4, no. 1 (2009): 82. http://dx.doi.org/10.15837/ijccc.2009.1.2416.
Full textLIN, CHIH-LUNG, HSU-YUNG CHENG, KUO-CHIN FAN, CHUN-WEI LU, CHANG-JUNG JUAN, and CHIH-WEI KUO. "BI-FEATURE VERIFICATION FOR PALMPRINT IMAGES CAPTURED IN PEGLESS SCENARIOS." International Journal of Pattern Recognition and Artificial Intelligence 27, no. 05 (2013): 1356007. http://dx.doi.org/10.1142/s0218001413560077.
Full textSato, Yoshihiro, and Yue Bao. "Log-Polar Facial Recognition Using Minimum Feature Band." International Journal of Pattern Recognition and Artificial Intelligence 35, no. 09 (2021): 2156003. http://dx.doi.org/10.1142/s0218001421560036.
Full textPOORNIMA, S., and S. SUBRAMANIAN. "UNCONSTRAINED IRIS AUTHENTICATION THROUGH FUSION OF RGB CHANNEL INFORMATION." International Journal of Pattern Recognition and Artificial Intelligence 28, no. 05 (2014): 1456010. http://dx.doi.org/10.1142/s0218001414560102.
Full text