Articoli di riviste sul tema "Biometric information protection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Biometric information protection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Lee, Boo-Ha, e Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection". LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, n. 1 (30 giugno 2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Teng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. e Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter". HighTech and Innovation Journal 4, n. 2 (1 giugno 2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Taha, Mohammed A., e Hanaa M. Ahmed. "A fuzzy vault development based on iris images". EUREKA: Physics and Engineering, n. 5 (13 settembre 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Kim, Younjin, e Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology". Korean Constitutional Law Association 28, n. 4 (30 dicembre 2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Shin, Yong-Nyuo, Yong-Jun Lee e Myung-Geun Chun. "Biometric Template Security for Personal Information Protection". Journal of Korean Institute of Intelligent Systems 18, n. 4 (25 agosto 2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Lee, Yong-Joon, e Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n. 5 (1 maggio 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Lee, Yong-Joon, e Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n. 5 (1 maggio 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Sulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised". Information and Control Systems, n. 4 (24 agosto 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Punithavathi, P., e S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns". Indonesian Journal of Electrical Engineering and Computer Science 7, n. 3 (1 settembre 2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Ma, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience". Lecture Notes in Education Psychology and Public Media 10, n. 1 (14 settembre 2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Joyce, S., e S. Veni. "Iris Biometric Watermarking for Authentication Using Multiband Discrete Wavelet Transform and Singular-Value Decomposition". International journal of electrical and computer engineering systems 14, n. 3 (28 marzo 2023): 259–66. http://dx.doi.org/10.32985/ijeces.14.3.3.
Arutyunov, V. V., e N. S. Natkin. "Comparative analysis of biometric systems for information protection". Scientific and Technical Information Processing 37, n. 2 (aprile 2010): 87–93. http://dx.doi.org/10.3103/s0147688210020012.
Tot, Ivan, Jovan Bajčetić, Boriša Jovanović, Mladen Trikoš, Dušan Bogićević e Tamara Gajić. "Biometric standards and methods". Vojnotehnicki glasnik 69, n. 4 (2021): 963–77. http://dx.doi.org/10.5937/vojtehg69-32296.
Kumaran, P., R. Ashoka Rajan, T. Veeramani e R. Thilagavathy. "Template Protection Using Multi Biometric Web Modulo Graph". Journal of Computational and Theoretical Nanoscience 16, n. 11 (1 novembre 2019): 4883–88. http://dx.doi.org/10.1166/jctn.2019.8400.
Voznyi, Yaroslav, Mariia Nazarkevych, Volodymyr Hrytsyk, Nataliia Lotoshynska e Bohdana Havrysh. "DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD". Cybersecurity: Education, Science, Technique 12, n. 4 (24 giugno 2021): 85–95. http://dx.doi.org/10.28925/2663-4023.2021.12.8595.
Yang, Wencheng, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone e Craig Valli. "A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things". Sensors 19, n. 13 (6 luglio 2019): 2985. http://dx.doi.org/10.3390/s19132985.
Astrakhantsev, Andrii, e Galyna Liashenko. "Data protection management process during remote biometric authentication". System research and information technologies, n. 3 (30 ottobre 2022): 71–85. http://dx.doi.org/10.20535/srit.2308-8893.2022.3.05.
Bisogni, Carmen, Lucia Cascone e Fabio Narducci. "Periocular Data Fusion for Age and Gender Classification". Journal of Imaging 8, n. 11 (9 novembre 2022): 307. http://dx.doi.org/10.3390/jimaging8110307.
Shin, Yong-Nyuo, e Myung-Geun Chun. "Personal Information Protection for Biometric Verification based TeleHealth Services". Journal of Korean Institute of Intelligent Systems 20, n. 5 (25 ottobre 2010): 659–64. http://dx.doi.org/10.5391/jkiis.2010.20.5.659.
Liu, Yue. "Property rights for biometric information – a protection measure?" International Journal of Private Law 2, n. 3 (2009): 244. http://dx.doi.org/10.1504/ijpl.2009.024141.
Utegen, D., e B. Zh Rakhmetov. "Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models". Journal of Digital Technologies and Law 1, n. 3 (20 agosto 2023): 825–44. http://dx.doi.org/10.21202/jdtl.2023.36.
KOPCZEWSKI, Marian, e Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS". Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, n. 4 (2 ottobre 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.
Patil, Sonali D., Roshani Raut, Rutvij H. Jhaveri, Tariq Ahamed Ahanger, Pallavi V. Dhade, Atul B. Kathole e Kapil N. Vhatkar. "Robust Authentication System with Privacy Preservation of Biometrics". Security and Communication Networks 2022 (2 maggio 2022): 1–14. http://dx.doi.org/10.1155/2022/7857975.
Shi, Quan. "Guardians of Privacy: Understanding the European Union's Framework for Biometric Data Protection". International Journal of Biology and Life Sciences 3, n. 1 (30 maggio 2023): 59–61. http://dx.doi.org/10.54097/ijbls.v3i1.9669.
S. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund e Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users". Entropy 21, n. 11 (24 ottobre 2019): 1033. http://dx.doi.org/10.3390/e21111033.
Kim, Jun Hwan, Woon-Kyung Song e Hyun Cheol Lee. "Exploring the Determinants of Travelers’ Intention to Use the Airport Biometric System: A Korean Case Study". Sustainability 15, n. 19 (24 settembre 2023): 14129. http://dx.doi.org/10.3390/su151914129.
Mohan, Mamtha, e B. K. Sujatha. "A Tenable Approach for Protection of Electronic Medical Records Using Thermal Image Watermarking". International Journal of Biomedical and Clinical Engineering 6, n. 2 (luglio 2017): 46–61. http://dx.doi.org/10.4018/ijbce.2017070104.
Zhao, Dongdong, Shu Fang, Jianwen Xiang, Jing Tian e Shengwu Xiong. "Iris Template Protection Based on Local Ranking". Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4519548.
Loboda, Dmitriy I. "Protection of biometric information in the framework of aviation security procedures". Herald of the Azerbaijan Engineering Academy 14, n. 4 (2022): 21–28. http://dx.doi.org/10.52171/2076-0515_2022_14_04_21_28.
NI, YIN, e LING YE. "Legal Protection Dilemma and Countermeasures of Chinese consumers" Personal Biometric Information". Dong-A Journal of International Business Transactions Law 39 (31 ottobre 2022): 105–34. http://dx.doi.org/10.31839/ibt.2022.10.39.105.
Hayat Al-Dmour, Et al. "Enhancing Biometric Security: A Framework for Detecting and Preventing False Identification". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 9 (5 novembre 2023): 3681–90. http://dx.doi.org/10.17762/ijritcc.v11i9.9591.
王, 丹. "Research on the Special Protection Mechanism of Biometric Information in the Implementation of the Personal Information Protection Law". Open Journal of Legal Science 12, n. 05 (2024): 2956–63. http://dx.doi.org/10.12677/ojls.2024.125421.
Gomez-Barrero, Marta, Christian Rathgeb, Guoqiang Li, Raghavendra Ramachandra, Javier Galbally e Christoph Busch. "Multi-biometric template protection based on bloom filters". Information Fusion 42 (luglio 2018): 37–50. http://dx.doi.org/10.1016/j.inffus.2017.10.003.
Gazina, Nayana Igorevna. "International and National Legal Approaches to the Protection of Genetic Information". Международное право, n. 4 (aprile 2022): 49–59. http://dx.doi.org/10.25136/2644-5514.2022.4.39236.
Hameed Yassir, Mohammed Ali, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin e Norulhusna Ahmad. "A standard ranking algorithm for robust iris template protection". Indonesian Journal of Electrical Engineering and Computer Science 34, n. 2 (1 maggio 2024): 1214. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1214-1225.
Hu, Jian Feng, e Zhen Dong Mu. "Authentication System for Biometric Applications Using Mobile Devices". Applied Mechanics and Materials 457-458 (ottobre 2013): 1224–27. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1224.
Feilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, n. 4 (25 gennaio 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Potocký, Sebastián, e Jozef Štulrajter. "The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity". Science & Military 17, n. 1 (2022): 29–36. http://dx.doi.org/10.52651/sam.a.2022.1.29-36.
Ren, Lijing, e Denghui Zhang. "A Privacy-Preserving Biometric Recognition System with Visual Cryptography". Advances in Multimedia 2022 (22 marzo 2022): 1–7. http://dx.doi.org/10.1155/2022/1057114.
Kuznetsov, A. A. "Legal Basis of Biometric Methods of Identity Authentication". Economics. Law. Innovaion, n. 1 (30 marzo 2021): 85–90. http://dx.doi.org/10.17586/2713-1874-2021-1-85-90.
Zannou, Boris Jerson, Tahirou Djara e Antoine Vianou. "Cylindrical Curve for Contactless Fingerprint Template Securisation". International Journal of Information Security and Privacy 16, n. 1 (1 gennaio 2022): 1–28. http://dx.doi.org/10.4018/ijisp.303664.
Zhongyu, Yin, e Yang Zihan. "Research on Legal Protection of Biometric Information in the Era of Web3.0". Progress in Social Sciences 6, n. 2 (2024): 179–89. http://dx.doi.org/10.35534/pss.0602015.
Yugai, Lyudmila. "ON THE ISSUE OF ENSURING BIOMETRIC DATA SECURITY DURING THE PERIOD OF THE DIGITALIZATION OF SOCIETY". Review of Law Sciences 5, n. 3 (24 novembre 2021): 63–74. http://dx.doi.org/10.51788/tsul.rols.2021.5.3./avtc7994.
Hernández-Álvarez, Luis, José María de Fuentes, Lorena González-Manzano e Luis Hernández Encinas. "Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review". Sensors 21, n. 1 (25 dicembre 2020): 92. http://dx.doi.org/10.3390/s21010092.
Hölbl, Marko, Boštjan Kežmah e Marko Kompara. "Data Protection Heterogeneity in the European Union". Applied Sciences 11, n. 22 (18 novembre 2021): 10912. http://dx.doi.org/10.3390/app112210912.
Kupiec, Mateusz. "Protection of Students’ Personal Data in Times of Development of Biometric Technologies as a Challenge for Universities in Poland". Białostockie Studia Prawnicze 25, n. 4 (1 dicembre 2020): 85–95. http://dx.doi.org/10.15290/bsp.2020.25.04.06.
Guo, Chunjie, Lin You e Gengran Hu. "A Novel Biometric Identification Scheme Based on Zero-Knowledge Succinct Noninteractive Argument of Knowledge". Security and Communication Networks 2022 (13 settembre 2022): 1–13. http://dx.doi.org/10.1155/2022/2791058.
Krausová, Alžběta. "Online Behavior Recognition: Can We Consider It Biometric Data under GDPR?" Masaryk University Journal of Law and Technology 12, n. 2 (17 settembre 2018): 161–78. http://dx.doi.org/10.5817/mujlt2018-2-3.
Kuznetsov, A. A., e D. O. Zakharov. "Deep learning-based models’ application to generating a cryptographic key from a face image". Radiotekhnika, n. 213 (16 giugno 2023): 31–40. http://dx.doi.org/10.30837/rt.2023.2.213.03.
Gunasekaran, Elavarasi, e Vanitha Muthuraman. "Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images". Journal of Computational and Theoretical Nanoscience 17, n. 12 (1 dicembre 2020): 5469–76. http://dx.doi.org/10.1166/jctn.2020.9441.