Academic literature on the topic 'Vulnerabilities of biometric system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerabilities of biometric system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Vulnerabilities of biometric system"
Sobabe, Abdou-Aziz, Tahirou Djara, and Antoine Vianou. "Biometric System Vulnerabilities: A Typology of Metadata." Advances in Science, Technology and Engineering Systems Journal 5, no. 1 (2020): 191–200. http://dx.doi.org/10.25046/aj050125.
Full textSingh, Yogendra Narain, and Sanjay Kumar Singh. "A taxonomy of biometric system vulnerabilities and defences." International Journal of Biometrics 5, no. 2 (2013): 137. http://dx.doi.org/10.1504/ijbm.2013.052964.
Full textKumar, Govind, Mozakker Anam, Md Sajid, and Dr Sakthivel M. "Finger Print Voting System." International Research Journal of Computer Science 11, no. 04 (2024): 200–203. http://dx.doi.org/10.26562/irjcs.2024.v1104.11.
Full textS Prasad, Puja. "Vulnerabilities of Biometric Authentication Systems: A Survey." HELIX 8, no. 5 (2018): 4100–4103. http://dx.doi.org/10.29042/2018-4100-4103.
Full textMoorthy, Kohbalan, Kauthar Mohd Daud, Steven R. Arokiasamy, and Md Raihanul Islam Tomal. "HYBRID BIOMETRIC AUTHENTICATION FOR AUTOMATIC TELLER MACHINE." International Journal of Software Engineering and Computer Systems 10, no. 1 (2024): 32–39. http://dx.doi.org/10.15282/ijsecs.10.1.2024.3.0121.
Full textGupta, Sharad. "Anti-Spoofing: Liveness Detection System." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 4997–5003. https://doi.org/10.22214/ijraset.2025.70787.
Full textKancherla, Tarun. "Fingerprint-Based Voting System Using C#: A Secure Biometric Approach to Modern Elections." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 158–60. https://doi.org/10.22214/ijraset.2025.68176.
Full textKhranovskyi, Mykola, and Andriy Kernytskyy. "Blockhain and Biometrics Challenges and Solutions." Computer Design Systems. Theory and Practice 6, no. 1 (2024): 189–98. http://dx.doi.org/10.23939/cds2024.01.189.
Full textAbbas, Alyaa A., and Zahraa Maan Sallal. "Hybrid biometric authentication for banks security improvements." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-A (2025): 1037–50. https://doi.org/10.47974/jdmsc-2030.
Full textShuwandy, Moceheb Lazam, Rawan Adel Fawzi Alsharida, and Maytham M. Hammood. "Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 165–77. https://doi.org/10.58496/mjcs/2025/011.
Full textDissertations / Theses on the topic "Vulnerabilities of biometric system"
Osoka, Agu. "Assessing and protecting against vulnerabilities of biometric systems." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509630.
Full textHigbee, Matthew Somers. "Deriving System Vulnerabilities Using Log Analytics." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/6139.
Full textJayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.
Full textBansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.
Full textSwabey, Matthew A. "The human auditory system as a biometric." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438725.
Full textMuthu, Rajesh. "Development of a secure biometric recognition system." Thesis, Northumbria University, 2016. http://nrl.northumbria.ac.uk/31618/.
Full textShonubi, Felix, Ciara Lynton, Joshua Odumosu, and Daryl Moten. "Exploring Vulnerabilities in Networked Telemetry." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596435.
Full textPoon, Hoi Ting. "Towards a practical and secure biometric authentication system." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/28017.
Full textMcCracken, Wendy Margaret. "Service Delivery To Deaf Children : Vulnerabilities Within The System." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518868.
Full textBrown, Allanah. "The fuel transportation system in British Columbia : attributes and vulnerabilities." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59065.
Full textBooks on the topic "Vulnerabilities of biometric system"
Dunstone, Ted, and Neil Yager, eds. Biometric System and Data Analysis. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-77627-9.
Full textElsworth, John T. Design and performance of biometric system. Nova Science Publishers, 2010.
Find full textChinhŭngwŏn, Hanʼguk Chŏngbo Poho, та Korea (South) Chŏngbo Tʻongsinbu, ред. Saengchʻe insik sisŭtʻem sihŏm kisul pʻyojunhwa yŏnʼgu =: A study on biometric system testing standardization. Chŏngbo Tʻongsinbu, 2006.
Find full textPiccolo, Jason J. Identifying criminal aliens within the United States criminal justice system. National University, 2013.
Find full textKuan, Hung-i. Evaluation of a biometric keystroke typing dynamics computer security system. Naval Postgraduate School, 1992.
Find full textNeil, Yager, ed. Biometric system and data analysis: Design, evaluation, and data mining. Springer, 2009.
Find full textOffice, United States Government Accountability. Homeland Security: Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. U.S. Govt. Accountability Office, 2007.
Find full textFrost & Sullivan., ed. U.S. electronic access control system markets: High security requirements promote biometric identification. Frost & Sullivan, 1994.
Find full textOffice, General Accounting. Aviation security: Vulnerabilities and potential improvements for the air cargo system : report to congressional requesters. U.S. General Accounting Office, 2002.
Find full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Vulnerabilities in the U.S. passport system can be exploited by criminals and terrorists: Hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, June 29, 2005. U.S. G.P.O., 2006.
Find full textBook chapters on the topic "Vulnerabilities of biometric system"
Adler, Andy. "Vulnerabilities in Biometric Encryption Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11527923_114.
Full textKumar, Tajinder, Shashi Bhushan, Pooja Sharma, and Vishal Garg. "Examining the Vulnerabilities of Biometric Systems." In Leveraging Computer Vision to Biometric Applications. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032614663-3.
Full textAdler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities: Overview." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_65-2.
Full textAdler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities: Overview." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_65-3.
Full textAdler, Andy, and Stephanie Schuckers. "Biometric Vulnerabilities, Overview." In Encyclopedia of Biometrics. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_65.
Full textAdler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities, Overview." In Encyclopedia of Biometrics. Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_65.
Full textColonna, Liane, and Gianluigi M. Riva. "Smart Mirrors and Data Protection Regulation." In Intelligent Systems Reference Library. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84158-3_12.
Full textLupu, E., and M. Cioban. "Voice Biometric System." In IFMBE Proceedings. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04292-8_53.
Full textWirtz, Brigitte. "Biometric System Security." In Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84982-3_12.
Full textAkula, Abhilash, Jeshwanth Ega, Kalyan Thota, and Gowtham. "Biometric Voting System." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_28.
Full textConference papers on the topic "Vulnerabilities of biometric system"
M, Vaidehi, Mesith Chaimanee, and Mithileysh Sathiyanarayanan. "Investigate the Vulnerabilities and Improvements in Biometric Authentication Systems Using Deep Learning Techniques." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939229.
Full textAbdeen, Ahmad, Mahmoud Mohanna, Yusuf Mansur, and Elena Battini Sonmez. "Biometric Fraud Detection System." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710778.
Full textP, Poovizhi, Pavithra D, Vijaya Kumar T, Nandhakumar M, Suryadharshini G, and Sheljin S G. "Multimodal Biometric Fusion System." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10895379.
Full textDeepa, G., A. Vennila, A. Sudhakar, S. J. Shubhashree, and J. V. Vishvadharshan. "Smart Biometric Cabinet Locking System." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725005.
Full textGudur, Bheemesh K., Tejashwini Ivanagimath, and Tarunkumar Rathod. "Biometric Based Portable Student Attendance System." In 2024 International Conference on Innovation and Novelty in Engineering and Technology (INNOVA). IEEE, 2024. https://doi.org/10.1109/innova63080.2024.10846952.
Full textAgrawal, Subhash Chand, and Rajesh Kumar Tripathi. "Biometric Attendance System Using Face Recognition." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10688314.
Full textMenakadevi, B., D. Sathish Kumar, P. Nagasaratha, and K. Parimalam. "Biometric System Attacks-A Case Study." In 2025 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE, 2025. https://doi.org/10.1109/iccece61355.2025.10940734.
Full textBustard, John D., John N. Carter, and Mark S. Nixon. "Targeted impersonation as a tool for the detection of biometric system vulnerabilities." In 2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 2013. http://dx.doi.org/10.1109/btas.2013.6712744.
Full textGoicoechea-Telleria, Ines, Judith Liu-Jimenez, Raul Sanchez-Reillo, and Wendy Ponce-Hemandez. "Vulnerabilities of biometric systems integrated in mobile devices: An evaluation." In 2016 International Carnahan Conference on Security Technology (ICCST). IEEE, 2016. http://dx.doi.org/10.1109/ccst.2016.7815677.
Full textZahid, Zainab, Ammar Haider, Nosheen Sabahat, and Asim Tanwir. "Vulnerabilities in Biometric Authentication of Smartphones." In 2020 IEEE 23rd International Multitopic Conference (INMIC). IEEE, 2020. http://dx.doi.org/10.1109/inmic50486.2020.9318094.
Full textReports on the topic "Vulnerabilities of biometric system"
Koskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1763279.
Full textHasnain, Saher. Vulnerabilities in the Animal By-Products Food System. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.gud520.
Full textLeMay, Elizabeth, Karen Scarfone, and Peter Mell. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.ir.7864.
Full textKemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.
Full textErol, Selman, and Michael Junho Lee. Financial System Architecture and Technological Vulnerability. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1122.
Full textShepard, Blake. Using a Large CYC-Based Ontology to Model and Predict Vulnerabilities at the Real-World Info-System Boundary. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada388002.
Full textLilavanichakul, Apichaya. Sustainable Agri-Food System and Resilience in Thailand - Exploring Technology-Driven Solutions for a Resilient Future. Asian Productivity Organization, 2025. https://doi.org/10.61145/gthi4179.
Full textMurphy, Maureen, Rachel Carey, and Leila Alexandra. The resilience of Melbourne's food system to climate and pandemic shocks. University of Melbourne, 2022. http://dx.doi.org/10.46580/124370.
Full textAbdulrahim, Sawsan, Zeinab Cherri, May Adra, and Fahed Hassan. Beyond Kafala: Employer roles in growing vulnerabilities of women migrant domestic workers. Centre for Excellence and Development Impact and Learning (CEDIL), 2023. http://dx.doi.org/10.51744/ceb7.
Full textMiller, Andy, and Paul Higgins. Making Communities Stronger and More Secure. American Meteorological Society, 2019. https://doi.org/10.1175/strengthening-communities-2019.
Full text