-
1
-
-
19444362827
-
A novel approach for regenerating a private key using password, fingerprint and smart card
-
Ahmed, F., and M. Y. Siyal. 2005. "A novel approach for regenerating a private key using password, fingerprint and smart card. Information Management & Computer Security 13(1):39-54.
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.1
, pp. 39-54
-
-
Ahmed, F.1
Siyal, M.Y.2
-
2
-
-
9544226886
-
A piece of yourself: Ethical issues in biometric identification
-
Alterman, A. 2003. "A piece of yourself: Ethical issues in biometric identification. Ethics and Information Technology 5(3):139-150.
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.3
, pp. 139-150
-
-
Alterman, A.1
-
3
-
-
0033266809
-
Information technology assimilation in firms: The influence of senior leadership and IT infrastructures
-
Armstrong, C. P., and V. Sambamurthy. 1999. "Information technology assimilation in firms: The influence of senior leadership and IT infrastructures. Information Systems Research 10(4):304-327.
-
(1999)
Information Systems Research
, vol.10
, Issue.4
, pp. 304-327
-
-
Armstrong, C.P.1
Sambamurthy, V.2
-
7
-
-
10044297649
-
-
New York: Springer-Verlag
-
Bolle, R. M., J. H. Connell, S. Pankanti, N. K. Ratha, and A. W. Senior. 2004. Guide to Biometrics. New York: Springer-Verlag.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Pankanti, S.3
Ratha, N.K.4
Senior, A.W.5
-
8
-
-
21344462624
-
The biometric state: The promise and peril of digital government in the new South Africa
-
Breckenridge, K. 2005. "The biometric state: The promise and peril of digital government in the new South Africa." Journal of Southern African Studies 31(2):267-282.
-
(2005)
Journal of Southern African Studies
, vol.31
, Issue.2
, pp. 267-282
-
-
Breckenridge, K.1
-
9
-
-
33745215611
-
Challenges and constraints to the diffusion of biometrics in information systems
-
Chandra, A., and T. Calderon. 2005. "Challenges and constraints to the diffusion of biometrics in information systems." Communication of the ACM 48(12):101-106.
-
(2005)
Communication of the ACM
, vol.48
, Issue.12
, pp. 101-106
-
-
Chandra, A.1
Calderon, T.2
-
11
-
-
0003095695
-
The partial least squares approach to structural equation modeling
-
edited by G. A. Marcoulides. Mahwah, NJ: Lawrence Erlbaum Associates
-
Chin, W. W. 1998. "The partial least squares approach to structural equation modeling." In Modern Methods for Business Research, edited by G. A. Marcoulides. Mahwah, NJ: Lawrence Erlbaum Associates.
-
(1998)
Modern Methods For Business Research
-
-
Chin, W.W.1
-
12
-
-
0031314601
-
Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation
-
Chin, W. W., A. Gopal, and W. D. Salisbury. 1997. "Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation." Information Systems Research 8(4):342-367.
-
(1997)
Information Systems Research
, vol.8
, Issue.4
, pp. 342-367
-
-
Chin, W.W.1
Gopal, A.2
Salisbury, W.D.3
-
13
-
-
0035637810
-
Research report: Empirical test of an EDI adoption model
-
Chwelos, P., I. Benbasat, and A. S. Dexter. 2001. "Research report: Empirical test of an EDI adoption model." Information Systems Research 12(3):304-321.
-
(2001)
Information Systems Research
, vol.12
, Issue.3
, pp. 304-321
-
-
Chwelos, P.1
Benbasat, I.2
Dexter, A.S.3
-
14
-
-
79960959955
-
-
Paper read at CHI Workshop on Human-Computer Interaction, Adoption Study and Security Systems, at Fort Lauderdale, FL
-
Coventry, L., A. De Angeli, and G. Johnson. 2003a. "Honest it's me! Self service verification." Paper read at CHI Workshop on Human-Computer Interaction, Adoption Study and Security Systems, at Fort Lauderdale, FL.
-
(2003)
Honest It's Me! Self Service Verification
-
-
Coventry, L.1
de Angeli, A.2
Johnson, G.3
-
15
-
-
0037699592
-
-
Paper read at Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, at Fort Lauderdale, FL
-
Coventry, L., A. De Angeli, and G. Johnson. 2003b. "Usability and biometric verification at the ATM interface." Paper read at Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, at Fort Lauderdale, FL.
-
(2003)
Usability and Biometric Verification At the ATM Interface
-
-
Coventry, L.1
de Angeli, A.2
Johnson, G.3
-
16
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F. D. 1989. "Perceived usefulness, perceived ease of use, and user acceptance of information technology." MIS Quarterly 13(3):319-340.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
-
17
-
-
0040218852
-
Corporate culture, customer orientation, and innovativeness in Japanese firms: A quadrad analysis
-
Deshpande, R., J. Farley, and F. Webster, Jr. 1993. "Corporate culture, customer orientation, and innovativeness in Japanese firms: A quadrad analysis." Journal of Marketing 57: 23-27.
-
(1993)
Journal of Marketing
, vol.57
, pp. 23-27
-
-
Deshpande, R.1
Farley, J.2
Webster, F.3
-
18
-
-
78049404188
-
Biometrics: An overview of the technology, challenges and control considerations
-
Down, M. P., and R. J. Sands. 2004. "Biometrics: An overview of the technology, challenges and control considerations." Information System Control Journal 4:53-56.
-
(2004)
Information System Control Journal
, vol.4
, pp. 53-56
-
-
Down, M.P.1
Sands, R.J.2
-
19
-
-
0036765493
-
Management's role in information security in a cyber economy
-
Dutta, A., and K. McCrohen. 2002. "Management's role in information security in a cyber economy." California Management Review 45(1):67-87.
-
(2002)
California Management Review
, vol.45
, Issue.1
, pp. 67-87
-
-
Dutta, A.1
McCrohen, K.2
-
20
-
-
79960945314
-
-
Paper read at International Workshop on Biometric Technologies-Special Forum on Modeling and Simulation in Biometric Technology, at Calgary, Alberta, Canada
-
Elliott, S., E. P. Kukula, and N. C. Sickler. 2004. "The challenges of the environment and the human/biometric device interaction on biometric system performance." Paper read at International Workshop on Biometric Technologies-Special Forum on Modeling and Simulation in Biometric Technology, at Calgary, Alberta, Canada.
-
(2004)
The Challenges of the Environment and The Human/biometric Device Interaction On Biometric System Performance
-
-
Elliott, S.1
Kukula, E.P.2
Sickler, N.C.3
-
21
-
-
33947507245
-
-
Paper read at Seventh International Conference on Document Analysis and Recognition (ICDAR'03), August 3-6, at Edinburgh, Scotland
-
Fairhurst, M. C. 2003. "Document identity, authentication and ownership: The future of biometric verification." Paper read at Seventh International Conference on Document Analysis and Recognition (ICDAR'03), August 3-6, at Edinburgh, Scotland.
-
(2003)
Document Identity, Authentication and Ownership: The Future of Biometric Verification
-
-
Fairhurst, M.C.1
-
22
-
-
35348902971
-
-
Federal Deposit Insurance Corporation, 2004. Retrieved from, (accessed July 7, 2010
-
Federal Deposit Insurance Corporation. 2004. Putting an End to Account-Hijacking dentity Theft. 2004. Retrieved from http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf, (accessed July 7, 2010).
-
(2004)
Putting An End to Account-Hijacking Dentity Theft
-
-
-
23
-
-
70449332446
-
-
Financial Institutions Examination Council, 2005. Retrieved from, (accessed July 7, 2010)
-
Financial Institutions Examination Council. 2005. Authentication in an Internet Banking Environment. 2005. Retrieved from http://www.ffiec.gov/pdf/authentication_guidance.pdf (accessed July 7, 2010).
-
(2005)
Authentication In An Internet Banking Environment
-
-
-
24
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C., and D. F. Larcker. 1981. "Evaluating structural equation models with unobservable variables and measurement error." Journal of Marketing Research 18(1):39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
25
-
-
0011763155
-
Organizational innovation adoption: A multi-level framework of determinants and opportunities for future research
-
Frambach, R. T., and N. Schillewaert. 2002. "Organizational innovation adoption: A multi-level framework of determinants and opportunities for future research." Journal of Business Research 55(2):163-176.
-
(2002)
Journal of Business Research
, vol.55
, Issue.2
, pp. 163-176
-
-
Frambach, R.T.1
Schillewaert, N.2
-
28
-
-
0031065132
-
A review of innovation research in economics, sociology and technology management
-
Gopalakrishnan, S., and F. Damanpour. 1997. "A review of innovation research in economics, sociology and technology management." Omega, International Journal of Management Science 25(1):15-28.
-
(1997)
Omega, International Journal of Management Science
, vol.25
, Issue.1
, pp. 15-28
-
-
Gopalakrishnan, S.1
Damanpour, F.2
-
29
-
-
4544289614
-
Electronic commerce adoption: An empirical study of small and medium US businesses
-
Grandon, E., and M. Pearson. 2004. "Electronic commerce adoption: An empirical study of small and medium US businesses." Information & Management 42(1):197-216.
-
(2004)
Information & Management
, vol.42
, Issue.1
, pp. 197-216
-
-
Grandon, E.1
Pearson, M.2
-
30
-
-
0003506109
-
-
Englewood Cliffs, NJ: Prentice-Hall
-
Hair, J. F., R. E. Anderson, R. L. Tatham, and W. C. Black. 1998. Multivariate Data Analysis. Englewood Cliffs, NJ: Prentice-Hall.
-
(1998)
Multivariate Data Analysis
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
31
-
-
0036198047
-
Biometric authentication: Assuring access to information
-
Harris, A. J., and D. C. Yen. 2002. "Biometric authentication: Assuring access to information." Information Management & Computer Security 10(1):12-19.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.1
, pp. 12-19
-
-
Harris, A.J.1
Yen, D.C.2
-
32
-
-
0032223734
-
Emerging electronic partnerships: Antecedents and dimensions of EDI use from the supplier's perspective
-
Hart, P. J., and C. S. Saunders. 1998. "Emerging electronic partnerships: Antecedents and dimensions of EDI use from the supplier's perspective." Journal of Management Information Systems 14(4):87-111.
-
(1998)
Journal of Management Information Systems
, vol.14
, Issue.4
, pp. 87-111
-
-
Hart, P.J.1
Saunders, C.S.2
-
33
-
-
79960949344
-
-
Paper read at Symposium on Usable Privacy and Security (SOUPS), July 18-20, Pittsburgh, PA
-
Heckle, R., A. Patrick, and A. Ozok. 2007. "Perception and acceptance of fingerprint biometric technology." Paper read at Symposium on Usable Privacy and Security (SOUPS), July 18-20, Pittsburgh, PA.
-
(2007)
Perception and Acceptance of Fingerprint Biometric Technology
-
-
Heckle, R.1
Patrick, A.2
Ozok, A.3
-
34
-
-
31744437338
-
Biometrics: The next frontier in service excellence, productivity and security in the service sector
-
Heracleous, L., and J.Wirtz. 2006. "Biometrics: The next frontier in service excellence, productivity and security in the service sector." Managing Service Quality 16(1):12-22.
-
(2006)
Managing Service Quality
, vol.16
, Issue.1
, pp. 12-22
-
-
Heracleous, L.1
-
35
-
-
67650706330
-
Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives
-
Hu, L., and P. M. Bentler. 1999. "Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives." Structural Equation Modeling 6(1):1-55.
-
(1999)
Structural Equation Modeling
, vol.6
, Issue.1
, pp. 1-55
-
-
Hu, L.1
Bentler, P.M.2
-
36
-
-
33749608454
-
-
Paper read at System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference January 4-7, Hawaii
-
Hu, Q., P. Hart, and D. Cooke. 2006. "The role of external influences on organizational information security practices: An institutional perspective." Paper read at System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference January 4-7, Hawaii.
-
(2006)
The Role of External Influences On Organizational Information Security Practices: An Institutional Perspective
-
-
Hu, Q.1
Hart, P.2
Cooke, D.3
-
37
-
-
39749159243
-
Electronic data interchange and small organizations: Adoption and impact of technology
-
Iacovou, C. L., I. Benbasat, and A. S. Dexter. 1995. "Electronic data interchange and small organizations: Adoption and impact of technology." MIS Quarterly 19(4):465-485.
-
(1995)
MIS Quarterly
, vol.19
, Issue.4
, pp. 465-485
-
-
Iacovou, C.L.1
Benbasat, I.2
Dexter, A.S.3
-
39
-
-
10044236375
-
-
Paper read at 17th International Conf. on Pattern Recognition (ICPR'04), August 23-26, Cambridge, U.K
-
Jain, A. K., S. Pankanti, S. Prabhakar, L. Hong, and A. Ross. 2004. "Biometrics: A grand challenge." Paper read at 17th International Conf. on Pattern Recognition (ICPR'04), August 23-26, Cambridge, U.K.
-
(2004)
Biometrics: A Grand Challenge
-
-
Jain, A.K.1
Pankanti, S.2
Prabhakar, S.3
Hong, L.4
Ross, A.5
-
40
-
-
33749373316
-
Determining the intention to use biometric devices: An application and extension of the technology acceptance model
-
James, T., T. Pirim, K. Boswell, B. Reithel, and R. Barkhi. 2006. "Determining the intention to use biometric devices: An application and extension of the technology acceptance model." Journal of Organizational and End User Computing 18(3):1-24.
-
(2006)
Journal of Organizational and End User Computing
, vol.18
, Issue.3
, pp. 1-24
-
-
James, T.1
Pirim, T.2
Boswell, K.3
Reithel, B.4
Barkhi, R.5
-
41
-
-
33344465188
-
A review of the predictors, linkages, and biases in IT innovation adoption research
-
Jeyaraj, A., J. Rottman, and M. Lacity. 2006. "A review of the predictors, linkages, and biases in IT innovation adoption research." Journal of Information Technology 21:1-23.
-
(2006)
Journal of Information Technology
, vol.21
, pp. 1-23
-
-
Jeyaraj, A.1
Rottman, J.2
Lacity, M.3
-
42
-
-
79955133521
-
-
Paper read at Proceedings of the 2007 ACM workshop on Privacy in electronic society, October 29, Alexandria, VA
-
Jones, L. A., A. I. Antón, and J. B. Earp. 2007. "Towards understanding user perceptions of authentication technologies." Paper read at Proceedings of the 2007 ACM workshop on Privacy in electronic society, October 29, Alexandria, VA.
-
(2007)
Towards Understanding User Perceptions of Authentication Technologies
-
-
Jones, L.A.1
Antón, A.I.2
Earp, J.B.3
-
43
-
-
60649108798
-
Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services
-
Kim, S. S., and J.-Y. Son. 2009. "Out of dedication or constraint? A dual model of post-adoption phenomena and its empirical test in the context of online services." MISQuarterly 33(1):49-70.
-
(2009)
MISQuarterly
, vol.33
, Issue.1
, pp. 49-70
-
-
Kim, S.S.1
Son, J.-Y.2
-
44
-
-
33745294915
-
Evaluating biometrics as internal control solutions to organizational risk
-
Kleist, V., R. Riley Jr., and T. Pearson. 2005. "Evaluating biometrics as internal control solutions to organizational risk." Journal of American Academy of Business 6(2):339-343.
-
(2005)
Journal of American Academy of Business
, vol.6
, Issue.2
, pp. 339-343
-
-
Kleist, V.1
Riley Jr., R.2
Pearson, T.3
-
45
-
-
33745302193
-
The emergence of biometrics and its effect on consumers
-
Langenderfer, J., and S. Linnhoff. 2005. "The emergence of biometrics and its effect on consumers." Journal of Consumer Affairs 39(2):314-338.
-
(2005)
Journal of Consumer Affairs
, vol.39
, Issue.2
, pp. 314-338
-
-
Langenderfer, J.1
Linnhoff, S.2
-
46
-
-
0000354529
-
Managerial influence in the implementation of new technology
-
Leonard-Barton, D., and I. Deschamps. 1988. "Managerial influence in the implementation of new technology." Management Science 34(10):1252-1265.
-
(1988)
Management Science
, vol.34
, Issue.10
, pp. 1252-1265
-
-
Leonard-Barton, D.1
Deschamps, I.2
-
47
-
-
33847761422
-
Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
-
Liang, H., S. Nilesh, Q. Hu, and Y. Xue. 2007. "Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management." MIS Quarterly 31(1):59-87.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 59-87
-
-
Liang, H.1
Nilesh, S.2
Hu, Q.3
Xue, Y.4
-
48
-
-
36849068492
-
Public perceptions of biometric devices: The effect of misinformation on acceptance and use
-
Moody, J. 2004. "Public perceptions of biometric devices: The effect of misinformation on acceptance and use." Journal of Issues in Informing Science and Information Technology 1:753-761.
-
(2004)
Journal of Issues In Informing Science and Information Technology
, vol.1
, pp. 753-761
-
-
Moody, J.1
-
51
-
-
51049103392
-
Understanding user perspectives on biometric technology
-
Pons, A., and P. Polak. 2008. "Understanding user perspectives on biometric technology." Communications of the ACM 51(9):115-118.
-
(2008)
Communications of the ACM
, vol.51
, Issue.9
, pp. 115-118
-
-
Pons, A.1
Polak, P.2
-
54
-
-
0000309139
-
Organizational and interorganizational determinants of EDI diffusion and organizational performance: A causal model
-
Ramamurthy, K., G. Premkumar, and M. Crum. 1999. "Organizational and interorganizational determinants of EDI diffusion and organizational performance: A causal model." Journal of Organizational Computing and Electronic Commerce 9(4):253-285.
-
(1999)
Journal of Organizational Computing and Electronic Commerce
, vol.9
, Issue.4
, pp. 253-285
-
-
Ramamurthy, K.1
Premkumar, G.2
Crum, M.3
-
55
-
-
0034809453
-
Enhancing security and privacy in biometricsbased authentication systems
-
Ratha, N. K., J. H. Connell, and R. M. Bolle. 2001. "Enhancing security and privacy in biometricsbased authentication systems." IBM Systems Journal 40(3):614-634.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
56
-
-
18144405742
-
The biometric technologies business case: A systematic approach
-
Riley Jr., R. A., and V. F. Kleist. 2005. "The biometric technologies business case: A systematic approach." Information Management & Computer Security 13(2):89-105.
-
(2005)
Information Management & Computer Security
, vol.13
, Issue.2
, pp. 89-105
-
-
Riley, R.A.1
Kleist, V.F.2
-
60
-
-
0036021507
-
Technological opportunism and radical technology adoption: An application to e-business
-
Srinivasan, R., G. Lilien, and A. Rangaswamy. 2002. "Technological opportunism and radical technology adoption: An application to e-business." Journal of Marketing 66(3):47-60.
-
(2002)
Journal of Marketing
, vol.66
, Issue.3
, pp. 47-60
-
-
Srinivasan, R.1
Lilien, G.2
Rangaswamy, A.3
-
61
-
-
79960937453
-
Introduction to biometric technology: Capabilities and applications to the food stamp program
-
Arlington, VA: R. Lewis & Co., Inc
-
Sticha, P. J., and J. P. Ford. 1999. "Introduction to biometric technology: Capabilities and applications to the food stamp program." In U.S. Department of Agriculture contract no: FCS 53-3198-6-025 (pp. 1-39). Arlington, VA: R. Lewis & Co., Inc.
-
(1999)
U.S. Department of Agriculture Contract No: FCS 53-3198-6-025
, pp. 1-39
-
-
Sticha, P.J.1
Ford, J.P.2
-
62
-
-
0030529141
-
Organizational innovativeness: Exploring the relationship between organizational determinants of innovation, types of innovations, and the measures of organizational performance
-
Subramanian, A., and S. Nilakanta. 1996. "Organizational innovativeness: Exploring the relationship between organizational determinants of innovation, types of innovations, and the measures of organizational performance." Omega, International Journal of Management Science 24(6):631-647.
-
(1996)
Omega, International Journal of Management Science
, vol.24
, Issue.6
, pp. 631-647
-
-
Subramanian, A.1
Nilakanta, S.2
-
63
-
-
77949849538
-
-
Paper read at 3rd International Conference on New Technologies, Mobility and Security (NTMS), Dec. 20-23, Cairo
-
Tassabehji, R., and M. A. Kamala. 2009. "Improving e-banking security with biometrics: Modelling user attitudes and acceptance." Paper read at 3rd International Conference on New Technologies, Mobility and Security (NTMS), Dec. 20-23, Cairo.
-
(2009)
Improving E-banking Security With Biometrics: Modelling User Attitudes and Acceptance
-
-
Tassabehji, R.1
Kamala, M.A.2
-
64
-
-
0242454335
-
Predicting intention to adopt interorganizational linkages: An institutional perspective
-
Teo, H. H., K. K. Wei, and I. Benbasat. 2003. "Predicting intention to adopt interorganizational linkages: An institutional perspective." MIS Quarterly 27(1):19-49.
-
(2003)
MIS Quarterly
, vol.27
, Issue.1
, pp. 19-49
-
-
Teo, H.H.1
Wei, K.K.2
Benbasat, I.3
-
65
-
-
11144254446
-
Adoption of e-processes by service firms: An empirical study of antecedents
-
Tsikriktsis, N., G. Lanzolla, and M. Frohlich. 2004. "Adoption of e-processes by service firms: An empirical study of antecedents." Production and Operations Management 13(3):216-229.
-
(2004)
Production and Operations Management
, vol.13
, Issue.3
, pp. 216-229
-
-
Tsikriktsis, N.1
Lanzolla, G.2
Frohlich, M.3
-
67
-
-
79960933906
-
-
Marketwatch. Retrieved from, accessed June 21, 2011
-
Waters, J. 2010. "Identity fraud nightmare: One man's story." Marketwatch. Retrieved from http://www.marketwatch.com/story/the-rise-of-identity-theft-one-mans-nightmare-2010-02-10 (accessed June 21, 2011).
-
(2010)
Identity Fraud Nightmare: One Man's Story
-
-
Waters, J.1
-
68
-
-
41949138126
-
Biometrics in identity management systems
-
Wayman, J. L. 2008. "Biometrics in identity management systems." IEEE Security and Privacy Magazine 6(2):30-37.
-
(2008)
IEEE Security and Privacy Magazine
, vol.6
, Issue.2
, pp. 30-37
-
-
Wayman, J.L.1
-
69
-
-
32644486640
-
Generating premium returns on your IT investments
-
Weil, P., and S. Aral. 2006. "Generating premium returns on your IT investments." Sloan Management Review 47(2):39-48.
-
(2006)
Sloan Management Review
, vol.47
, Issue.2
, pp. 39-48
-
-
Weil, P.1
Aral, S.2
-
70
-
-
1642301442
-
On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements
-
Zorkadis, V., and P. Donos. 2004. "On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements." Information Management & Computer Security 12(1):125-137.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.1
, pp. 125-137
-
-
Zorkadis, V.1
Donos, P.2
|