메뉴 건너뛰기




Volumn , Issue , 2005, Pages 1-3

Biometrics in virtual communities and digital governments

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34547323958     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59140-563-4.ch001     Document Type: Chapter
Times cited : (2)

References (10)
  • 2
    • 9944223229 scopus 로고    scopus 로고
    • PalmHashing: A novel approach for cancelable biometrics
    • Connie, T., Teoh, A., Goh, M., & Ngo, D. (2005). PalmHashing: A novel approach for cancelable biometrics. Information Processing Letters, 93(1), 1-5.
    • (2005) Information Processing Letters , vol.93 , Issue.1 , pp. 1-5
    • Connie, T.1    Teoh, A.2    Goh, M.3    Ngo, D.4
  • 6
    • 0036887596 scopus 로고    scopus 로고
    • Speaker recognition-General classifier approaches and data fusion methods
    • Ramachandran, R.P., Farrell, K.R., Ramachandran, R., & Mammone, R.J. (2002). Speaker recognition-General classifier approaches and data fusion methods. Pattern Recognition, 35(12), 2801-2821.
    • (2002) Pattern Recognition , vol.35 , Issue.12 , pp. 2801-2821
    • Ramachandran, R.P.1    Farrell, K.R.2    Ramachandran, R.3    Mammone, R.J.4
  • 8
    • 0038343934 scopus 로고    scopus 로고
    • Information fusion in biometrics
    • Ross, A., & Jain, A. (2003). Information fusion in biometrics. Pattern Recognition Letters, 24(13), 2115-2125.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.13 , pp. 2115-2125
    • Ross, A.1    Jain, A.2
  • 9
    • 14644396643 scopus 로고    scopus 로고
    • Fusion of biometric algorithms in the recognition problem
    • Rukhin, A.L., & Malioutov, I. (2005). Fusion of biometric algorithms in the recognition problem. Pattern Recognition Letters, 26(5), 679-684.
    • (2005) Pattern Recognition Letters , vol.26 , Issue.5 , pp. 679-684
    • Rukhin, A.L.1    Malioutov, I.2
  • 10
    • 0000562870 scopus 로고    scopus 로고
    • Inside risks: The uses and abuses of biometrics
    • Scheier, B. (1999). Inside risks: The uses and abuses of biometrics. ACM Communications, 42, 136.
    • (1999) ACM Communications , vol.42 , pp. 136
    • Scheier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.