Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Identification by biometrics

Identification by biometrics Blometric methods can be used for people recognition using their own human characteristics and differences guaranteeing interests of both the controller and the controlled. The blometric factors retained here are Fingerprints, Retina vascularisation, Voice, Geometry of the hand, Dynamics of signature, Keyboard latencies, Genetic fingerprinting A comparison of performance of such methods including general remarks are given to show the necessity of establishing standards for objective comparison for validation and also for improving algorithms.Biometric methods for identification of people are in progress and can stengthen computer security. Biometrics represents the concept "to be". It can be mixed with the two other concepts "to know" and "to have" to solve security weaknesses like the "fuzzy password choice problem." http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Identification by biometrics

ACM SIGSAC Review , Volume 8 (2) – May 1, 1990

Loading next page...
 
/lp/association-for-computing-machinery/identification-by-biometrics-J0F1Yh9iIU

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 1990 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/101126.101127
Publisher site
See Article on Publisher Site

Abstract

Blometric methods can be used for people recognition using their own human characteristics and differences guaranteeing interests of both the controller and the controlled. The blometric factors retained here are Fingerprints, Retina vascularisation, Voice, Geometry of the hand, Dynamics of signature, Keyboard latencies, Genetic fingerprinting A comparison of performance of such methods including general remarks are given to show the necessity of establishing standards for objective comparison for validation and also for improving algorithms.Biometric methods for identification of people are in progress and can stengthen computer security. Biometrics represents the concept "to be". It can be mixed with the two other concepts "to know" and "to have" to solve security weaknesses like the "fuzzy password choice problem."

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: May 1, 1990

There are no references for this article.