Using Biometric Characteristics to Increase ITS Security
Downloads
Downloads
(1] * * * The Biometrics Glossary Page,
http://www.eyenetwach.com/biometrics-glossary/
biometric-terms.html (29.10.2003.)
(2] * * * International Security Home page,
http://www.security-int.com (27.10.2003.)
(3] P. Reid: Biometrics for Network Security, Prentice Hall,
Upper Saddle River, NJ, 2004.
(4] U. Dieckmann, P. Plankensteiner, T. Wagner: Sesam:A
biometric person identification system using sensor fusion,
Pattern Recognition Letters, 1997. 18(9): 827-833
(5] J. Bigun, J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzales-
Rodriguez: Multimodal Biometric Authentication
using Quality Signals in Mobile Communications, IEEE-
Computer Society Press, (Proc. of 12'th Inf. Conf. on
image analysis and processing, Mantova, Italy), 2003.
pp. 2.11,
(6] A. Jain, A. Ross, S. Prabhakar: An introduction to biometric
recognition, Michigan State University, 2004
(7] S. Panikanti, R. Bolle, A. Jain: Biometrics: The Future of
Identification, IEEE Computer, Vol. 33, 2000.
(8] M. Baca, K. Rabuzin: Biometrics in Network Security,
MIPRO 2005, XXVIII International Convention, Proceedings
Information Systems Security, Opatija, 2005.
pp. 205-210
S. G. Davies: Touching Big Brother, Information Technology
& People, Vol. 7, No.4, 1994
(10] A. Jain, R. Bolle, S. Pankanti: Biometrics: Personal
Identification in Networked Society, Kluwer, 1999.
J, Wayman, A. Jain, D. Maltoni, D. Maio: Biometric
Systems, Springer, 2005.
(12] K. V. Diegert: Estimationg performance characteristics of
biometric identifiers, Proceedings of Biometrics Consortium
Conference, San Jose, CA, 1996.