-
3
-
-
25444484191
-
Perceived control: Scales for privacy in ubiquitous computing environments
-
S. Spiekermann, "Perceived control: Scales for privacy in ubiquitous computing environments," Proc. Int. Conf. User Modeling, 2005.
-
(2005)
Proc. Int. Conf. User Modeling
-
-
Spiekermann, S.1
-
4
-
-
25444432074
-
RFID and the perception of control: The consumer's view
-
O. Günther and S. Spiekermann, "RFID and the perception of control: the consumer's view," Comm. ACM, vol. 48, no. 9, pp. 73-76, 2005.
-
(2005)
Comm. ACM
, vol.48
, Issue.9
, pp. 73-76
-
-
Günther, O.1
Spiekermann, S.2
-
5
-
-
0015731415
-
Personal control over aversive stimuli and its relationship to stress
-
J. Averill, "Personal control over aversive stimuli and its relationship to stress," Psychological Bulletin, vol. 80, no. 4, pp. 286-303, 1973.
-
(1973)
Psychological Bulletin
, vol.80
, Issue.4
, pp. 286-303
-
-
Averill, J.1
-
6
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behavior change
-
A. Bandura, "Self-efficacy: Toward a unifying theory of behavior change," Psychological Review, vol. 84, no. 2, pp. 191-215, 1977.
-
(1977)
Psychological Review
, vol.84
, Issue.2
, pp. 191-215
-
-
Bandura, A.1
-
7
-
-
0038588436
-
E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior
-
S. Spiekermann, J. Grossklags, and B. Berendt, "E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior," ACM Conf. Electronic Commerce, pp. 38-47, 2001.
-
(2001)
ACM Conf. Electronic Commerce
, pp. 38-47
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
8
-
-
34247143763
-
-
BIOVISION:, Online, Available
-
"BIOVISION: Roadmap for biometrics in Europe to 2010," 2003. [Online]. Available: http://www.eubiometricsforum.com/ dmdocuments/BIOVISION- Roadmap.pdf
-
(2003)
Roadmap for biometrics in Europe to 2010
-
-
-
9
-
-
0242724398
-
Army biometric applications: Identifying and addressing sociocultural concerns
-
J. D. Woodward Jr, K. W. Webb, E. M. Newton, M. Bradley, and D. Rubenson, "Army biometric applications: identifying and addressing sociocultural concerns," Santa Monica (CA):RAND, 2001.
-
(2001)
Santa Monica (CA):RAND
-
-
Woodward Jr, J.D.1
Webb, K.W.2
Newton, E.M.3
Bradley, M.4
Rubenson, D.5
-
11
-
-
10044288679
-
Soft Biometric Traits for Personal Recognition Systems
-
A. Jain, S. C. Dass, and K. Nandakumar, "Soft Biometric Traits for Personal Recognition Systems," Proc. ICBA, 2004.
-
(2004)
Proc. ICBA
-
-
Jain, A.1
Dass, S.C.2
Nandakumar, K.3
-
13
-
-
84874672882
-
Cost models for future software life cycle processes: CO-COMO 2.0
-
B. Boehm, B. Clark, E. Horowitz, C. Westland, R. Madachy, and R. Selby, "Cost models for future software life cycle processes: CO-COMO 2.0," Annals of Software Engineering, vol. 1, no. 1, pp. 57-94, 1995.
-
(1995)
Annals of Software Engineering
, vol.1
, Issue.1
, pp. 57-94
-
-
Boehm, B.1
Clark, B.2
Horowitz, E.3
Westland, C.4
Madachy, R.5
Selby, R.6
-
15
-
-
34247147241
-
Privacy issues in the application of biometrics: A European perspective in biometric systems
-
J. Wayman, A. Jain, D. Maltoni, and D. Maio, Eds. Springer
-
M. Rejman-Greene, "Privacy issues in the application of biometrics: a European perspective in biometric systems," in Biometric Systems, J. Wayman, A. Jain, D. Maltoni, and D. Maio, Eds. Springer, 2005.
-
(2005)
Biometric Systems
-
-
Rejman-Greene, M.1
-
16
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
17
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
A. Goh and D. Ngo, "Computation of cryptographic keys from face biometrics," Proc. Comm. and Multimedia Security, pp. 1-13, 2003.
-
(2003)
Proc. Comm. and Multimedia Security
, pp. 1-13
-
-
Goh, A.1
Ngo, D.2
-
18
-
-
33745315642
-
An Analysis on Accuracy of Cancelable Biometrics based on BioHashing
-
K. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, and H. Toby, "An Analysis on Accuracy of Cancelable Biometrics based on BioHashing," LNAI, vol. 3683, pp. 1168-1172, 2005.
-
(2005)
LNAI
, vol.3683
, pp. 1168-1172
-
-
Cheung, K.1
Kong, A.2
Zhang, D.3
Kamel, M.4
You, J.5
Toby, H.6
-
19
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," AVBPA, pp. 393-402, 2003.
-
(2003)
AVBPA
, pp. 393-402
-
-
Linnartz, J.1
Tuyls, P.2
-
20
-
-
59249098652
-
Biometric Encryption: Technology for Strong Authentication, Security and Privacy
-
A. Cavoukian, A. Stoianov, and F. Carter, "Biometric Encryption: Technology for Strong Authentication, Security and Privacy," Policies and Research in Identity Management, Proc. Idman'07), 2008.
-
(2008)
Policies and Research in Identity Management, Proc. Idman'07)
-
-
Cavoukian, A.1
Stoianov, A.2
Carter, F.3
-
21
-
-
43949116287
-
Biometric Template Security
-
A. Jain, K. Nandakumar, and A. Nagar, "Biometric Template Security," EURASIP Journal on Advances in Signal Processing, vol. 8, no. 2, 2008.
-
(2008)
EURASIP Journal on Advances in Signal Processing
, vol.8
, Issue.2
-
-
Jain, A.1
Nandakumar, K.2
Nagar, A.3
-
23
-
-
30844458593
-
A Fuzzy Vault Scheme
-
A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
25
-
-
38149020102
-
Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications
-
H. Moon and K. Lee, "Biometric Driver Authentication Based on 3D Face Recognition for Telematics Applications," Universal Access in HCI Part I, vol. LNCS 4554, pp. 473-480, 2007.
-
(2007)
Universal Access in HCI Part I
, vol.LNCS
, Issue.4554
, pp. 473-480
-
-
Moon, H.1
Lee, K.2
-
26
-
-
35648986520
-
Quality Dependent Fusion of Intramodal and Multimodal Biometric Experts
-
J. Kittler, N. Poh, O. Fatukasi, K. Messer, K. Kryszczuk, J. Richiardi, and A. Drygajlo, "Quality Dependent Fusion of Intramodal and Multimodal Biometric Experts," Proc. SPIE, pp. 653 903-1, 2007.
-
(2007)
Proc. SPIE
, vol.903 -1
, pp. 653
-
-
Kittler, J.1
Poh, N.2
Fatukasi, O.3
Messer, K.4
Kryszczuk, K.5
Richiardi, J.6
Drygajlo, A.7
-
27
-
-
35448943582
-
Fusion of Biometric Data with Quality Estimates via a Bayesian Belief Network
-
D. E. Maurer and J. P. Baker, "Fusion of Biometric Data with Quality Estimates via a Bayesian Belief Network," Pattern Recognition, vol. 41, no. 3, pp. 821-832, 2007.
-
(2007)
Pattern Recognition
, vol.41
, Issue.3
, pp. 821-832
-
-
Maurer, D.E.1
Baker, J.P.2
-
28
-
-
37249025100
-
On combination of face authentication experts by a mixture of quality dependent fusion classifiers
-
N. Poh, G. Heusch, and J. Kittler, "On combination of face authentication experts by a mixture of quality dependent fusion classifiers," Int. W. Multiple Classifier Systems, vol. LNCS 4472, pp. 344-356, 2007.
-
(2007)
Int. W. Multiple Classifier Systems
, vol.LNCS
, Issue.4472
, pp. 344-356
-
-
Poh, N.1
Heusch, G.2
Kittler, J.3
-
29
-
-
64549119286
-
-
5th Summer School for Advanced Studies on Biometrics for Secure Authentication: New Technologies for Security and Privacy
-
th Summer School for Advanced Studies on Biometrics for Secure Authentication: New Technologies for Security and Privacy."
-
-
-
|