Sciweavers

110 search results - page 17 / 22
» Biometric Security Systems: Fingerprint and Speech Technolog...
Sort
View
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 5 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
PET
2009
Springer
15 years 6 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
JNW
2008
104views more  JNW 2008»
14 years 11 months ago
Fraudulent Internet Banking Payments Prevention using Dynamic Key
As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-servic...
Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srin...
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
15 years 1 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 5 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan