Letteratura scientifica selezionata sul tema "Biometrics"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Biometrics".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Biometrics"
Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos e Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements". Annals of Emerging Technologies in Computing 5, n. 5 (20 marzo 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.
Testo completoB.R., Rohini, e Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH". International Journal of Research -GRANTHAALAYAH 5, n. 4RACSIT (30 aprile 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Testo completoMichelsen, Lea Laura. "Thinking Beyond Biometrics". A Peer-Reviewed Journal About 7, n. 1 (6 luglio 2018): 36–49. http://dx.doi.org/10.7146/aprja.v7i1.115063.
Testo completoYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang e Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics". Sensors 23, n. 7 (29 marzo 2023): 3566. http://dx.doi.org/10.3390/s23073566.
Testo completo., Himanshi, Trisha Gulati e Yasha Hasija. "Biometrics in Healthcare". INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, n. 2 (15 aprile 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.
Testo completoSharma, Tushar, e Upinder Kaur. "Biometric Security: A Review to Future". Revista Gestão Inovação e Tecnologias 11, n. 4 (29 luglio 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.
Testo completoChoudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman e Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems". International Journal of Image and Graphics 18, n. 01 (gennaio 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.
Testo completoShopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar e Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions". Journal of Cybersecurity and Privacy 1, n. 3 (31 agosto 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.
Testo completoSable, Harsh, e Divya Bajpai Tripathy. "A Review on Comparative Analysis on Different Sort of Physiological and Behavioral Biometric Framework". International Journal of Advance Research and Innovation 9, n. 2 (2021): 1–9. http://dx.doi.org/10.51976/ijari.922101.
Testo completoRajvanshi, Saumya, Shiv Chauhan e Savneet Kaur. "A New Wave in Biometric System: Systematic Study". CGC International Journal of Contemporary Technology and Research 4, n. 2 (5 agosto 2022): 300–305. http://dx.doi.org/10.46860/cgcijctr.2022.07.31.300.
Testo completoTesi sul tema "Biometrics"
Janečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.
Testo completoPereira, Tiago de Freitas 1985. "A comparative study of countermeasures to detect spoofing attacks in face authentication systems = Um estudo comparativo de contramedidas para detectar ataques de spoofing em sistemas de autenticação de faces". [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261478.
Testo completoDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-23T20:06:41Z (GMT). No. of bitstreams: 1 Pereira_TiagodeFreitas_M.pdf: 17638731 bytes, checksum: 15a8d07214e3b31accd3218e5bde20cb (MD5) Previous issue date: 2013
Resumo: O Resumo poderá ser visualizado no texto completo da tese digital
Abstract: The complete Abstract is available with the full electronic document.
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
Hmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.
Testo completoThis thesis aims to regenerate crypto-biometric keys (cryptographic keys obtained with biometric data) that are resistant to quantum cryptanalysis methods. The challenge is to obtain keys with high entropy to have a high level of security, knowing that the entropy contained in biometric references limits the entropy of the key. Our choice was to exploit facial biometrics.We first created a state-of-the-art face recognition system based on public frameworks and publicly available data based on DNN embedding extractor architecture and triplet loss function. We participated in two H2020 projects. For the SpeechXRays project, we provided implementations of classical and cancelable face biometrics. For the H2020 EMPATHIC project, we created a face verification REST API. We also participated in the NIST SRE19 multimedia challenge with the final version of our classical face recognition system.In order to obtain crypto-biometric keys, it is necessary to have binary biometric references. To obtain the binary representations directly from face images, we proposed an original method, leveraging autoencoders and the previously implemented classical face biometrics. We also exploited the binary representations to create a cancelable face verification system.Regarding our final goal, to generate crypto-biometric keys, we focused on symmetric keys. Symmetric encryption is threatened by the Groover algorithm because it reduces the complexity of a brute force attack on a symmetric key from 2N à 2(N/2). To mitigate the risk introduced by quantum computing, we need to increase the size of the keys. To this end, we tried to make the binary representation longer and more discriminative. For the keys to be resistant to quantum computing, they should have double the length.We succeeded in regenerating crypto-biometric keys longer than 400bits (with low false acceptance and false rejection rates) thanks to the quality of the binary embeddings. The crypto-biometric keys have high entropy and are resistant to quantum cryptanalysis, according to the PQCrypto project, as they satisfy the length requirement. The keys are regenerated using a fuzzy commitment scheme leveraging BCH codes
Holeksa, David. "Návrh audio-vizuální databáze pro extrakci sekundárních biometrických a ne-biometrických znaků". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220544.
Testo completoGancarčík, Lukáš. "Vicefaktorová autentizace elektronických dokumentů". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224008.
Testo completoSamangooei, Sina. "Semantic biometrics". Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/153901/.
Testo completoVaradinov, Petr. "Účel a implementace snímání otisků prstů v osobních počítačích". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162689.
Testo completoFerreira, Iuri Emmanuel de Paula [UNESP]. "Delineamentos D-ótimos para os modelos de Michaelis-Menten e de Hill". Universidade Estadual Paulista (UNESP), 2010. http://hdl.handle.net/11449/87920.
Testo completoCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Os resultados de muitos experimentos em áreas da biologia, como a farmacologia, a bioquímica e a agronomia, geralmente são analisados por ajustes de modelos não-lineares através dos quais pretende-se explicar a resposta através dos fatores pré-especificados no experimento. As estimações dos parâmetros ou das funções de interesse podem ser imprecisas se os níveis dos fatores não forem adequadamente escolhidos, impossibilitando ao pesquisador a obtenção da informação desejada sobre o objeto de estudo. A construção de um delineamento ótimo, que maximize a informação sobre algum aspecto de interesse, é crucial para o sucesso da prática experimental. O objetivo deste trabalho foi a obtenção de delineamentos D-ótimos exatos para modelos não-lineares utilizados para estudar cinética enzimática e transporte de minerais no organismo, como o de Michaelis-Menten e o de RiU. Para este fim, duas abordagens foram consideradas, a saber, a de delineamentos localmente ótimos e a pseudo-Bayesiana. Com o auxílio dos algoritmos genético e exchange foi possível obter delineamentos D-ótimos exatos para o modelo de Michaelis-Menten, para o modelo de RiU e para ambos, considerando-se valores diferentes e distribuições com diversos coeficientes de variação como informação a priori
The results of many experiments in biological fields, as pharmacology, biochemistry and agriculture, usually are analyzed by fitting nonlinear models, which are supposed to describe well the resp'onse to the pre-specified factors in the experiment. The estimates of the parameters or of their functions of interest could be imprecise if the factor levels are not adequately chosen. The construction of an optimum design, which maximizes the information about some aspect of interest, is crucial for the success of the experimental practice. The aim of this work was constructing exact D-optimal designs for nonlinear models usually used in studies of enzyme kinetics and mineral transport in organisms, such as the Michaelis-Menten and RiU models. Two approaches were considered, the locally optimal and pseudo- Bayesian designs. Genetic and Exchange algorithms were used for getting exact designs aiming at the Michaelis-Menten model, aiming at the RiU model, each one separately, and aiming at both models when considering a composite criterion. Different values and probability distributions with several variation coefficients were considered as prior information
Martins, Andréa Camila dos Santos [UNESP]. "O método de pontos interiores no planejamento da radioterapia". Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/95056.
Testo completoCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Um tratamento do câncer por radioterapia tem como objetivo a eliminação das células do tumor e preservação das células saudáveis, obtendo assim uma melhor homo-geneização da dose administrada e menor possibilidade de complicações clínicas durante o tratamento. O sucesso do tratamento depende de um bom planejamento. Para um planejamento ótimo, técnicas matemáticas estão sendo utilizadas com o objetivo de maximizar a radiação no tumor e minimizar a radiação nas regiões vizinhas, com isto modelos de programação linear têm sido ótimas ferramentas para auxiliar a construção dos planos de tratamento por radioterapia. Assim, este trabalho visa: estudar os principais conceitos envolvidos no planejamento do tratamento do câncer por radioterapia; estudar modelos de programação linear (PL) aplicados ao planejamento ótimo; fazer um amplo estudo sobre a técnica de pontos interiores para PL e apresentar uma aplicação desta técnica para resolução de um problema de planejamento ótimo para o tratamento do câncer por radioterapia
A cancer treatment by radiotherapy aims to eliminate tumor cells and preservation of healthy cells, thus getting a better homogenization of the administered dose and fewer chances of complications during treatment. Treatment success depends on good planning. For an optimal planning, mathematical techniques are being used in order to maximize radiation at tumor and minimize radiation in the surrounding regions, thus linear programming models has been great tools to assist the construction of treatment plans for radiation therapy. Thus, this work aims: studying the key concepts involved in planning the treatment of cancer by radiotherapy; study the models the linear program- ming (PL) applied to optimal planning; make a broad study on the technique of interior point for PL and present an enforcement of this technique for solving a problem of optimal planning for cancer treatment by radiotherapy
Brobeck, Stefan, e Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden". Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.
Testo completoBiometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.
The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.
There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.
We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.
Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.
Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.
Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.
Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.
Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.
Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.
Libri sul tema "Biometrics"
Boulgouris, Nikolaos V., Konstantinos N. Plataniotis e Evangelia Micheli-Tzanakou, a cura di. Biometrics. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2009. http://dx.doi.org/10.1002/9780470522356.
Testo completoJain, Anil K., Ruud Bolle e Sharath Pankanti, a cura di. Biometrics. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/b117227.
Testo completoKeith, McLennan, Chilvers Simon, ARTE France, Films d'ici (Firm) e Films for the Humanities & Sciences (Firm), a cura di. Biometrics. Princeton, NJ: Films for the Humanities & Sciences, 2008.
Cerca il testo completoR, Wilson Susan, e Burden Conrad John, a cura di. Biometrics. Oxford, U.K: Eolss Publishers, 2009.
Cerca il testo completoR, Wilson Susan, e Burden Conrad John, a cura di. Biometrics. Oxford, U.K: Eolss Publishers, 2009.
Cerca il testo completoD, Woodward John. Biometrics. New York: McGraw-Hill/Osborne, 2003.
Cerca il testo completoAshbourn, Julian. Practical Biometrics. London: Springer London, 2004. http://dx.doi.org/10.1007/978-0-85729-406-7.
Testo completoNait-ali, Amine, a cura di. Hidden Biometrics. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-0956-4.
Testo completoKumar, Santosh, Sanjay Kumar Singh, Rishav Singh e Amit Kumar Singh. Animal Biometrics. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7956-6.
Testo completoRattani, Ajita, Reza Derakhshani e Arun Ross, a cura di. Selfie Biometrics. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2.
Testo completoCapitoli di libri sul tema "Biometrics"
Ding, Sophia, Emilia Nunes, Pascal Bettendorff e Weyde Lin. "Biometrics". In Trends in Data Protection and Encryption Technologies, 121–28. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.
Testo completoMordini, Emilio. "Biometrics". In Handbook of Global Bioethics, 505–26. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-2512-6_101.
Testo completoKizza, Joseph Migga. "Biometrics". In Texts in Computer Science, 277–89. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_14.
Testo completoIslam, M. Nazrul. "Biometrics". In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_10-1.
Testo completoWayman, James L. "Biometrics". In Handbook of Computer Networks, 539–52. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch34.
Testo completoMoallem, Abbas. "Biometrics". In Understanding Cybersecurity Technologies, 27–38. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003038429-4.
Testo completoSkågeby, Jörgen. "Biometrics". In Encyclopedia of Big Data, 118–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-32010-6_26.
Testo completoten Have, Henk, e Maria do Céu Patrão Neves. "Biometrics". In Dictionary of Global Bioethics, 187. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54161-3_90.
Testo completoIslam, M. Nazrul. "Biometrics". In Encyclopedia of Security and Emergency Management, 29–35. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_10.
Testo completoSkågeby, Jörgen. "Biometrics". In Encyclopedia of Big Data, 1–2. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_26-1.
Testo completoAtti di convegni sul tema "Biometrics"
Özgür, Hafızullah, e Yunus Emre Selçuk. "Authentication in ATM/ITM Machines using Iris Recognition Biometrics". In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131901.
Testo completoGaipov, J. B. "DIGITAL PAYMENT TECHNOLOGIES WITH BIOMETRICS". In НОВЫЕ БИЗНЕС-МОДЕЛИ ЦИФРОВОЙ ЭКОНОМИКИ В СУБЪЕКТАХ РФ. ХГУЭП, 2022. http://dx.doi.org/10.38161/978-5-7823-0753-0-2022-131-134.
Testo completoJackson, Aldrewvonte, Kofi Kyei, Yasmin Eady, Brian Dowtin, Bernard Aldrich, Albert Esterline e Joseph Shelton. "Biometric Authentication for the Mitigation of Human Risk on a Social Network". In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004763.
Testo completoTalabi, A. A., O. B. Longe, A. A. Muhammad e K. Olusanya. "Cybersecurity Risk Management in Identity Systems using Biometric-based Multimodal Authentication." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28n2p5.
Testo completoPahuja, Gunjan, e T. N. Nagabhushan. "Biometric authentication & identification through behavioral biometrics: A survey". In 2015 International Conference on Cognitive Computing and Information Processing (CCIP). IEEE, 2015. http://dx.doi.org/10.1109/ccip.2015.7100681.
Testo completoYazdanpanah, Ali Pour, Karim Faez e Rasoul Amirfattahi. "Multimodal biometric system using face, ear and gait biometrics". In 2010 10th International Conference on Information Sciences, Signal Processing and their Applications (ISSPA). IEEE, 2010. http://dx.doi.org/10.1109/isspa.2010.5605477.
Testo completoGilady, Erez, Dale Lindskog e Shaun Aghili. "Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems". In 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2014. http://dx.doi.org/10.1109/waina.2014.133.
Testo completoBashir, Faisal, David Usher, Pablo Casaverde e Marc Friedman. "Video Surveillance for Biometrics: Long-Range Multi-biometric System". In 2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2008. http://dx.doi.org/10.1109/avss.2008.28.
Testo completoSchulz, Douglas A. "Mouse Curve Biometrics". In 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, 2006. http://dx.doi.org/10.1109/bcc.2006.4341626.
Testo completoMoody, Janette. "Public Perceptions of Biometric Devices:The Effect of Misinformation on Acceptance and Use". In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2743.
Testo completoRapporti di organizzazioni sul tema "Biometrics"
Moore, Brad, e Michaela Iorga. Biometrics testing. Gaithersburg, Md.: National Institute of Standards and Technology, luglio 2009. http://dx.doi.org/10.6028/nist.hb.150-25.
Testo completoBIOMETRICS TASK FORCE ARLINGTON VA. Biometrics Task Force. Fort Belvoir, VA: Defense Technical Information Center, gennaio 2009. http://dx.doi.org/10.21236/ada517637.
Testo completoJohnston, R., e W. Grace. Bartus Iris biometrics. Office of Scientific and Technical Information (OSTI), luglio 1996. http://dx.doi.org/10.2172/262980.
Testo completoGarris, Michael D., e Charles L. Wilson. NIST biometrics evaluations and developments. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.ir.7204.
Testo completoChoong, Yee-Yin, Mary Theofanos, Brian Stanton e Patrick Hofmann. Symbols representing biometrics in use. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7645.
Testo completoKang, George S., e Yvette Lee. Voice Biometrics for Information Assurance Applications. Fort Belvoir, VA: Defense Technical Information Center, dicembre 2002. http://dx.doi.org/10.21236/ada408449.
Testo completoSchulz, Robert Jr H. Prospects of Biometrics at-a-Distance. Fort Belvoir, VA: Defense Technical Information Center, settembre 2015. http://dx.doi.org/10.21236/ad1009318.
Testo completoMilley, Mark A., Gerald B. O'Keefe, Timothy J. Leahy, Willard III M. Burleson, S. A. Stearney, David G. Throop e R. Jr B. Turner. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations. Fort Belvoir, VA: Defense Technical Information Center, maggio 2016. http://dx.doi.org/10.21236/ad1013627.
Testo completoFrenzen, Christopher L. Convolution Methods for Mathematical Problems in Biometrics. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1999. http://dx.doi.org/10.21236/ada359925.
Testo completoPhillips, P. J., H. A. Sahibzada, Patrick J. Flynn, K. W. Bowyer, A. O'Toole, S. Weimer, J. R. Beveridge et al. Overview of the multiple biometrics grand challenge. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7607.
Testo completo