Artículos de revistas sobre el tema "Biometric information protection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Biometric information protection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Lee, Boo-Ha y Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection". LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, n.º 1 (30 de junio de 2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Texto completoTeng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. y Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter". HighTech and Innovation Journal 4, n.º 2 (1 de junio de 2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Texto completoTaha, Mohammed A. y Hanaa M. Ahmed. "A fuzzy vault development based on iris images". EUREKA: Physics and Engineering, n.º 5 (13 de septiembre de 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Texto completoKim, Younjin y Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology". Korean Constitutional Law Association 28, n.º 4 (30 de diciembre de 2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Texto completoShin, Yong-Nyuo, Yong-Jun Lee y Myung-Geun Chun. "Biometric Template Security for Personal Information Protection". Journal of Korean Institute of Intelligent Systems 18, n.º 4 (25 de agosto de 2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Texto completoLee, Yong-Joon y Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de mayo de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completoLee, Yong-Joon y Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de mayo de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completoSulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised". Information and Control Systems, n.º 4 (24 de agosto de 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Texto completoPunithavathi, P. y S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns". Indonesian Journal of Electrical Engineering and Computer Science 7, n.º 3 (1 de septiembre de 2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Texto completoMa, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience". Lecture Notes in Education Psychology and Public Media 10, n.º 1 (14 de septiembre de 2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Texto completoJoyce, S. y S. Veni. "Iris Biometric Watermarking for Authentication Using Multiband Discrete Wavelet Transform and Singular-Value Decomposition". International journal of electrical and computer engineering systems 14, n.º 3 (28 de marzo de 2023): 259–66. http://dx.doi.org/10.32985/ijeces.14.3.3.
Texto completoArutyunov, V. V. y N. S. Natkin. "Comparative analysis of biometric systems for information protection". Scientific and Technical Information Processing 37, n.º 2 (abril de 2010): 87–93. http://dx.doi.org/10.3103/s0147688210020012.
Texto completoTot, Ivan, Jovan Bajčetić, Boriša Jovanović, Mladen Trikoš, Dušan Bogićević y Tamara Gajić. "Biometric standards and methods". Vojnotehnicki glasnik 69, n.º 4 (2021): 963–77. http://dx.doi.org/10.5937/vojtehg69-32296.
Texto completoKumaran, P., R. Ashoka Rajan, T. Veeramani y R. Thilagavathy. "Template Protection Using Multi Biometric Web Modulo Graph". Journal of Computational and Theoretical Nanoscience 16, n.º 11 (1 de noviembre de 2019): 4883–88. http://dx.doi.org/10.1166/jctn.2019.8400.
Texto completoVoznyi, Yaroslav, Mariia Nazarkevych, Volodymyr Hrytsyk, Nataliia Lotoshynska y Bohdana Havrysh. "DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD". Cybersecurity: Education, Science, Technique 12, n.º 4 (24 de junio de 2021): 85–95. http://dx.doi.org/10.28925/2663-4023.2021.12.8595.
Texto completoYang, Wencheng, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone y Craig Valli. "A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things". Sensors 19, n.º 13 (6 de julio de 2019): 2985. http://dx.doi.org/10.3390/s19132985.
Texto completoAstrakhantsev, Andrii y Galyna Liashenko. "Data protection management process during remote biometric authentication". System research and information technologies, n.º 3 (30 de octubre de 2022): 71–85. http://dx.doi.org/10.20535/srit.2308-8893.2022.3.05.
Texto completoBisogni, Carmen, Lucia Cascone y Fabio Narducci. "Periocular Data Fusion for Age and Gender Classification". Journal of Imaging 8, n.º 11 (9 de noviembre de 2022): 307. http://dx.doi.org/10.3390/jimaging8110307.
Texto completoShin, Yong-Nyuo y Myung-Geun Chun. "Personal Information Protection for Biometric Verification based TeleHealth Services". Journal of Korean Institute of Intelligent Systems 20, n.º 5 (25 de octubre de 2010): 659–64. http://dx.doi.org/10.5391/jkiis.2010.20.5.659.
Texto completoLiu, Yue. "Property rights for biometric information – a protection measure?" International Journal of Private Law 2, n.º 3 (2009): 244. http://dx.doi.org/10.1504/ijpl.2009.024141.
Texto completoUtegen, D. y B. Zh Rakhmetov. "Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models". Journal of Digital Technologies and Law 1, n.º 3 (20 de agosto de 2023): 825–44. http://dx.doi.org/10.21202/jdtl.2023.36.
Texto completoKOPCZEWSKI, Marian y Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS". Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, n.º 4 (2 de octubre de 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.
Texto completoPatil, Sonali D., Roshani Raut, Rutvij H. Jhaveri, Tariq Ahamed Ahanger, Pallavi V. Dhade, Atul B. Kathole y Kapil N. Vhatkar. "Robust Authentication System with Privacy Preservation of Biometrics". Security and Communication Networks 2022 (2 de mayo de 2022): 1–14. http://dx.doi.org/10.1155/2022/7857975.
Texto completoShi, Quan. "Guardians of Privacy: Understanding the European Union's Framework for Biometric Data Protection". International Journal of Biology and Life Sciences 3, n.º 1 (30 de mayo de 2023): 59–61. http://dx.doi.org/10.54097/ijbls.v3i1.9669.
Texto completoS. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund y Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users". Entropy 21, n.º 11 (24 de octubre de 2019): 1033. http://dx.doi.org/10.3390/e21111033.
Texto completoKim, Jun Hwan, Woon-Kyung Song y Hyun Cheol Lee. "Exploring the Determinants of Travelers’ Intention to Use the Airport Biometric System: A Korean Case Study". Sustainability 15, n.º 19 (24 de septiembre de 2023): 14129. http://dx.doi.org/10.3390/su151914129.
Texto completoMohan, Mamtha y B. K. Sujatha. "A Tenable Approach for Protection of Electronic Medical Records Using Thermal Image Watermarking". International Journal of Biomedical and Clinical Engineering 6, n.º 2 (julio de 2017): 46–61. http://dx.doi.org/10.4018/ijbce.2017070104.
Texto completoZhao, Dongdong, Shu Fang, Jianwen Xiang, Jing Tian y Shengwu Xiong. "Iris Template Protection Based on Local Ranking". Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4519548.
Texto completoLoboda, Dmitriy I. "Protection of biometric information in the framework of aviation security procedures". Herald of the Azerbaijan Engineering Academy 14, n.º 4 (2022): 21–28. http://dx.doi.org/10.52171/2076-0515_2022_14_04_21_28.
Texto completoNI, YIN y LING YE. "Legal Protection Dilemma and Countermeasures of Chinese consumers" Personal Biometric Information". Dong-A Journal of International Business Transactions Law 39 (31 de octubre de 2022): 105–34. http://dx.doi.org/10.31839/ibt.2022.10.39.105.
Texto completoHayat Al-Dmour, Et al. "Enhancing Biometric Security: A Framework for Detecting and Preventing False Identification". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (5 de noviembre de 2023): 3681–90. http://dx.doi.org/10.17762/ijritcc.v11i9.9591.
Texto completo王, 丹. "Research on the Special Protection Mechanism of Biometric Information in the Implementation of the Personal Information Protection Law". Open Journal of Legal Science 12, n.º 05 (2024): 2956–63. http://dx.doi.org/10.12677/ojls.2024.125421.
Texto completoGomez-Barrero, Marta, Christian Rathgeb, Guoqiang Li, Raghavendra Ramachandra, Javier Galbally y Christoph Busch. "Multi-biometric template protection based on bloom filters". Information Fusion 42 (julio de 2018): 37–50. http://dx.doi.org/10.1016/j.inffus.2017.10.003.
Texto completoGazina, Nayana Igorevna. "International and National Legal Approaches to the Protection of Genetic Information". Международное право, n.º 4 (abril de 2022): 49–59. http://dx.doi.org/10.25136/2644-5514.2022.4.39236.
Texto completoHameed Yassir, Mohammed Ali, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin y Norulhusna Ahmad. "A standard ranking algorithm for robust iris template protection". Indonesian Journal of Electrical Engineering and Computer Science 34, n.º 2 (1 de mayo de 2024): 1214. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1214-1225.
Texto completoHu, Jian Feng y Zhen Dong Mu. "Authentication System for Biometric Applications Using Mobile Devices". Applied Mechanics and Materials 457-458 (octubre de 2013): 1224–27. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1224.
Texto completoFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, n.º 4 (25 de enero de 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Texto completoPotocký, Sebastián y Jozef Štulrajter. "The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity". Science & Military 17, n.º 1 (2022): 29–36. http://dx.doi.org/10.52651/sam.a.2022.1.29-36.
Texto completoRen, Lijing y Denghui Zhang. "A Privacy-Preserving Biometric Recognition System with Visual Cryptography". Advances in Multimedia 2022 (22 de marzo de 2022): 1–7. http://dx.doi.org/10.1155/2022/1057114.
Texto completoKuznetsov, A. A. "Legal Basis of Biometric Methods of Identity Authentication". Economics. Law. Innovaion, n.º 1 (30 de marzo de 2021): 85–90. http://dx.doi.org/10.17586/2713-1874-2021-1-85-90.
Texto completoZannou, Boris Jerson, Tahirou Djara y Antoine Vianou. "Cylindrical Curve for Contactless Fingerprint Template Securisation". International Journal of Information Security and Privacy 16, n.º 1 (1 de enero de 2022): 1–28. http://dx.doi.org/10.4018/ijisp.303664.
Texto completoZhongyu, Yin y Yang Zihan. "Research on Legal Protection of Biometric Information in the Era of Web3.0". Progress in Social Sciences 6, n.º 2 (2024): 179–89. http://dx.doi.org/10.35534/pss.0602015.
Texto completoYugai, Lyudmila. "ON THE ISSUE OF ENSURING BIOMETRIC DATA SECURITY DURING THE PERIOD OF THE DIGITALIZATION OF SOCIETY". Review of Law Sciences 5, n.º 3 (24 de noviembre de 2021): 63–74. http://dx.doi.org/10.51788/tsul.rols.2021.5.3./avtc7994.
Texto completoHernández-Álvarez, Luis, José María de Fuentes, Lorena González-Manzano y Luis Hernández Encinas. "Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review". Sensors 21, n.º 1 (25 de diciembre de 2020): 92. http://dx.doi.org/10.3390/s21010092.
Texto completoHölbl, Marko, Boštjan Kežmah y Marko Kompara. "Data Protection Heterogeneity in the European Union". Applied Sciences 11, n.º 22 (18 de noviembre de 2021): 10912. http://dx.doi.org/10.3390/app112210912.
Texto completoKupiec, Mateusz. "Protection of Students’ Personal Data in Times of Development of Biometric Technologies as a Challenge for Universities in Poland". Białostockie Studia Prawnicze 25, n.º 4 (1 de diciembre de 2020): 85–95. http://dx.doi.org/10.15290/bsp.2020.25.04.06.
Texto completoGuo, Chunjie, Lin You y Gengran Hu. "A Novel Biometric Identification Scheme Based on Zero-Knowledge Succinct Noninteractive Argument of Knowledge". Security and Communication Networks 2022 (13 de septiembre de 2022): 1–13. http://dx.doi.org/10.1155/2022/2791058.
Texto completoKrausová, Alžběta. "Online Behavior Recognition: Can We Consider It Biometric Data under GDPR?" Masaryk University Journal of Law and Technology 12, n.º 2 (17 de septiembre de 2018): 161–78. http://dx.doi.org/10.5817/mujlt2018-2-3.
Texto completoKuznetsov, A. A. y D. O. Zakharov. "Deep learning-based models’ application to generating a cryptographic key from a face image". Radiotekhnika, n.º 213 (16 de junio de 2023): 31–40. http://dx.doi.org/10.30837/rt.2023.2.213.03.
Texto completoGunasekaran, Elavarasi y Vanitha Muthuraman. "Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images". Journal of Computational and Theoretical Nanoscience 17, n.º 12 (1 de diciembre de 2020): 5469–76. http://dx.doi.org/10.1166/jctn.2020.9441.
Texto completo