-
1
-
-
84944091818
-
-
“Emerging Technologies That Will Change the World,” MIT Technology Review, January/February 2001
-
“Emerging Technologies That Will Change the World,” MIT Technology Review, January/February 2001, http://www.technologyreview.com/articles/tr10toc0101.asp.
-
-
-
-
2
-
-
0000562870
-
Biometrics: Uses and Abuses
-
August
-
B. Schneier, “Biometrics: Uses and Abuses,” Inside Risks 110, Communications of the ACM, vol. 42, no. 8, August 1999, http://www.counterpane.com/insiderisks1.html.
-
(1999)
Inside Risks 110, Communications of the ACM
, vol.42
, Issue.8
-
-
Schneier, B.1
-
3
-
-
84944091819
-
-
International Biometric Group
-
“International Biometric Group,” http://www.biometricgroup.com/e/biometricmarketreport.htm.
-
-
-
-
4
-
-
84944091820
-
-
BioAPI Consortium
-
“BioAPI Consortium,” http://www.bioapi.org.
-
-
-
-
5
-
-
84944091821
-
-
International Biometrics Industry Association
-
“International Biometrics Industry Association,” http://www.ibia.org.
-
-
-
-
6
-
-
84944091822
-
-
Microsoft and I/O Software Strengthen Industry Adoption of Biometrics
-
“Microsoft and I/O Software Strengthen Industry Adoption of Biometrics,” http://www.microsoft.com/PressPass/press/2000/May00/BiometicsPR.asp.
-
-
-
-
7
-
-
84944091823
-
-
OASIS XML Common Biometric Format (XCBF) TC
-
“OASIS XML Common Biometric Format (XCBF) TC,” http://www.oasisopen.org/committees/xcbf/.
-
-
-
-
9
-
-
84944091825
-
-
Trusted Computing Platform Alliance
-
“Trusted Computing Platform Alliance,” http://www.trustedpc.org/.
-
-
-
-
10
-
-
0031233424
-
Speaker recognition: A tutorial
-
J. Campbell, “Speaker recognition: A tutorial,” Proceedings of the IEEE, vol. 85, no. 9, 1997.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
-
-
Campbell, J.1
-
12
-
-
84944091826
-
-
“Nuance Verifier 3.0 Technical Data Sheet
-
“Nuance Verifier 3.0 Technical Data Sheet,” http://www.nuance.com/pdf/verifier3techds.pdf.
-
-
-
-
15
-
-
84944091829
-
-
“S/Key,” FreeBSD Handbook
-
“S/Key,” FreeBSD Handbook, http://www.freebsd.org/doc/en US.ISO8859-1/books/handbook/skey.html.
-
-
-
-
16
-
-
84944091830
-
-
“The One-Time-Password SASL Mechanism,” RFC2444, 1998
-
“The One-Time-Password SASL Mechanism,” RFC2444, 1998, http://www.faqs.org/rfcs/rfc2444.html.
-
-
-
-
17
-
-
84944091831
-
-
“VeriVoice Secure Lock,”
-
“VeriVoice Secure Lock,” http://www.verivoice.com/verivoice sl.htm.
-
-
-
-
18
-
-
84944091832
-
-
“Text-to-Speech Voice Cloning System by AT&T Labs
-
“Text-to-Speech Voice Cloning System by AT&T Labs,” http://www.naturalvoices.att.com/.
-
-
-
-
19
-
-
84944091833
-
-
“Text-to-Speech System by Rhetorical,”
-
“Text-to-Speech System by Rhetorical,” http://www.rhetorical.com/.
-
-
-
-
20
-
-
0029304865
-
Human and machine recognition of faces: A Survey
-
R. Chellapa, C. Wilson, and S. Sirohey, “Human and machine recognition of faces: A Survey,” Proceedings of the IEEE, vol. 83, no. 5, pp. 705–741, 1995.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.5
, pp. 705-741
-
-
Chellapa, R.1
Wilson, C.2
Sirohey, S.3
-
21
-
-
84944091834
-
-
Viisage Corporation
-
“Viisage Corporation,” http://www.viisage.com.
-
-
-
-
22
-
-
84944091835
-
-
Visionics Corporation
-
“Visionics Corporation,” http://www.visionics.com.
-
-
-
-
24
-
-
0000209334
-
Local Feature Analysis: A General Statistical Theory for Object Representation
-
P. Penev and J. Atick, “Local Feature Analysis: A General Statistical Theory for Object Representation,” Network: Computation in Neural Systems, vol. 7, pp. 477–500, 1996.
-
(1996)
Network: Computation in Neural Systems
, vol.7
, pp. 477-500
-
-
Penev, P.1
Atick, J.2
-
25
-
-
84944091836
-
-
“Visionics FaceIt Technology, Frequent Asked Technical Questions,”
-
“Visionics FaceIt Technology, Frequent Asked Technical Questions,” http://www.visionics.com/faceit/faqs/faqs.pdf.
-
-
-
-
27
-
-
0036030112
-
Impact of Artificial Gummy Fingers on Fingerprint Systems
-
January 2002
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impact of Artificial Gummy Fingers on Fingerprint Systems,” in Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, January 2002.
-
Proc. Of SPIE, Optical Security and Counterfeit Deterrence Techniques IV
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
28
-
-
84944091838
-
-
“Finger-scan Vendors,”
-
“Finger-scan Vendors,” http://www.finger-scan.com/finger-scanvendors.htm.
-
-
-
-
29
-
-
84944091839
-
-
“Understanding PKI,”
-
“Understanding PKI,” http://verisign.netscape.com/security/pki/understanding.html.
-
-
-
-
31
-
-
84944091840
-
-
“International Biometric Group, Iris Recognition: The Technology,”
-
“International Biometric Group, Iris Recognition: The Technology,” http://www.iris-scan.com/iristechnology.htm.
-
-
-
-
34
-
-
33745122841
-
-
Iridian Technologies, 2001
-
G. Williams, “Iris Recognition Technology,” Iridian Technologies, 2001, http://www.politec.com/press%20info/white%20papers/Iris%20Recgnition.pdf.
-
Iris Recognition Technology
-
-
Williams, G.1
-
35
-
-
84944091843
-
-
“Iridian Technologies,”
-
“Iridian Technologies,” http://www.iridiantech.com.
-
-
-
-
37
-
-
0004141648
-
-
The MIT Press, Cambridge, Massachusetts
-
D. Whitfield and S. Landau, Privacy on the Line, The Politics of Wiretapping and Encryption, The MIT Press, Cambridge, Massachusetts, 1998.
-
(1998)
Privacy on the Line, the Politics of Wiretapping and Encryption
-
-
Whitfield, D.1
Landau, S.2
-
42
-
-
85009242599
-
A Handset Identifier Using Support Vector Machine
-
Denver, CO, USA, 2002
-
P. Ho, “A Handset Identifier Using Support Vector Machine,” in Proc. IEEE International Conference on Spoken Language Processing, Denver, CO, USA, 2002.
-
Proc. IEEE International Conference on Spoken Language Processing
-
-
Ho, P.1
|