Artykuły w czasopismach na temat „Biometric information protection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Biometric information protection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Lee, Boo-Ha, i Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection". LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, nr 1 (30.06.2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Pełny tekst źródłaTeng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. i Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter". HighTech and Innovation Journal 4, nr 2 (1.06.2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Pełny tekst źródłaTaha, Mohammed A., i Hanaa M. Ahmed. "A fuzzy vault development based on iris images". EUREKA: Physics and Engineering, nr 5 (13.09.2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Pełny tekst źródłaKim, Younjin, i Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology". Korean Constitutional Law Association 28, nr 4 (30.12.2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Pełny tekst źródłaShin, Yong-Nyuo, Yong-Jun Lee i Myung-Geun Chun. "Biometric Template Security for Personal Information Protection". Journal of Korean Institute of Intelligent Systems 18, nr 4 (25.08.2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Pełny tekst źródłaLee, Yong-Joon, i Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, nr 5 (1.05.2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Pełny tekst źródłaLee, Yong-Joon, i Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, nr 5 (1.05.2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Pełny tekst źródłaSulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised". Information and Control Systems, nr 4 (24.08.2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Pełny tekst źródłaPunithavathi, P., i S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns". Indonesian Journal of Electrical Engineering and Computer Science 7, nr 3 (1.09.2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Pełny tekst źródłaMa, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience". Lecture Notes in Education Psychology and Public Media 10, nr 1 (14.09.2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Pełny tekst źródłaJoyce, S., i S. Veni. "Iris Biometric Watermarking for Authentication Using Multiband Discrete Wavelet Transform and Singular-Value Decomposition". International journal of electrical and computer engineering systems 14, nr 3 (28.03.2023): 259–66. http://dx.doi.org/10.32985/ijeces.14.3.3.
Pełny tekst źródłaArutyunov, V. V., i N. S. Natkin. "Comparative analysis of biometric systems for information protection". Scientific and Technical Information Processing 37, nr 2 (kwiecień 2010): 87–93. http://dx.doi.org/10.3103/s0147688210020012.
Pełny tekst źródłaTot, Ivan, Jovan Bajčetić, Boriša Jovanović, Mladen Trikoš, Dušan Bogićević i Tamara Gajić. "Biometric standards and methods". Vojnotehnicki glasnik 69, nr 4 (2021): 963–77. http://dx.doi.org/10.5937/vojtehg69-32296.
Pełny tekst źródłaKumaran, P., R. Ashoka Rajan, T. Veeramani i R. Thilagavathy. "Template Protection Using Multi Biometric Web Modulo Graph". Journal of Computational and Theoretical Nanoscience 16, nr 11 (1.11.2019): 4883–88. http://dx.doi.org/10.1166/jctn.2019.8400.
Pełny tekst źródłaVoznyi, Yaroslav, Mariia Nazarkevych, Volodymyr Hrytsyk, Nataliia Lotoshynska i Bohdana Havrysh. "DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD". Cybersecurity: Education, Science, Technique 12, nr 4 (24.06.2021): 85–95. http://dx.doi.org/10.28925/2663-4023.2021.12.8595.
Pełny tekst źródłaYang, Wencheng, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone i Craig Valli. "A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things". Sensors 19, nr 13 (6.07.2019): 2985. http://dx.doi.org/10.3390/s19132985.
Pełny tekst źródłaAstrakhantsev, Andrii, i Galyna Liashenko. "Data protection management process during remote biometric authentication". System research and information technologies, nr 3 (30.10.2022): 71–85. http://dx.doi.org/10.20535/srit.2308-8893.2022.3.05.
Pełny tekst źródłaBisogni, Carmen, Lucia Cascone i Fabio Narducci. "Periocular Data Fusion for Age and Gender Classification". Journal of Imaging 8, nr 11 (9.11.2022): 307. http://dx.doi.org/10.3390/jimaging8110307.
Pełny tekst źródłaShin, Yong-Nyuo, i Myung-Geun Chun. "Personal Information Protection for Biometric Verification based TeleHealth Services". Journal of Korean Institute of Intelligent Systems 20, nr 5 (25.10.2010): 659–64. http://dx.doi.org/10.5391/jkiis.2010.20.5.659.
Pełny tekst źródłaLiu, Yue. "Property rights for biometric information – a protection measure?" International Journal of Private Law 2, nr 3 (2009): 244. http://dx.doi.org/10.1504/ijpl.2009.024141.
Pełny tekst źródłaUtegen, D., i B. Zh Rakhmetov. "Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models". Journal of Digital Technologies and Law 1, nr 3 (20.08.2023): 825–44. http://dx.doi.org/10.21202/jdtl.2023.36.
Pełny tekst źródłaKOPCZEWSKI, Marian, i Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS". Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, nr 4 (2.10.2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.
Pełny tekst źródłaPatil, Sonali D., Roshani Raut, Rutvij H. Jhaveri, Tariq Ahamed Ahanger, Pallavi V. Dhade, Atul B. Kathole i Kapil N. Vhatkar. "Robust Authentication System with Privacy Preservation of Biometrics". Security and Communication Networks 2022 (2.05.2022): 1–14. http://dx.doi.org/10.1155/2022/7857975.
Pełny tekst źródłaShi, Quan. "Guardians of Privacy: Understanding the European Union's Framework for Biometric Data Protection". International Journal of Biology and Life Sciences 3, nr 1 (30.05.2023): 59–61. http://dx.doi.org/10.54097/ijbls.v3i1.9669.
Pełny tekst źródłaS. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund i Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users". Entropy 21, nr 11 (24.10.2019): 1033. http://dx.doi.org/10.3390/e21111033.
Pełny tekst źródłaKim, Jun Hwan, Woon-Kyung Song i Hyun Cheol Lee. "Exploring the Determinants of Travelers’ Intention to Use the Airport Biometric System: A Korean Case Study". Sustainability 15, nr 19 (24.09.2023): 14129. http://dx.doi.org/10.3390/su151914129.
Pełny tekst źródłaMohan, Mamtha, i B. K. Sujatha. "A Tenable Approach for Protection of Electronic Medical Records Using Thermal Image Watermarking". International Journal of Biomedical and Clinical Engineering 6, nr 2 (lipiec 2017): 46–61. http://dx.doi.org/10.4018/ijbce.2017070104.
Pełny tekst źródłaZhao, Dongdong, Shu Fang, Jianwen Xiang, Jing Tian i Shengwu Xiong. "Iris Template Protection Based on Local Ranking". Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4519548.
Pełny tekst źródłaLoboda, Dmitriy I. "Protection of biometric information in the framework of aviation security procedures". Herald of the Azerbaijan Engineering Academy 14, nr 4 (2022): 21–28. http://dx.doi.org/10.52171/2076-0515_2022_14_04_21_28.
Pełny tekst źródłaNI, YIN, i LING YE. "Legal Protection Dilemma and Countermeasures of Chinese consumers" Personal Biometric Information". Dong-A Journal of International Business Transactions Law 39 (31.10.2022): 105–34. http://dx.doi.org/10.31839/ibt.2022.10.39.105.
Pełny tekst źródłaHayat Al-Dmour, Et al. "Enhancing Biometric Security: A Framework for Detecting and Preventing False Identification". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 9 (5.11.2023): 3681–90. http://dx.doi.org/10.17762/ijritcc.v11i9.9591.
Pełny tekst źródła王, 丹. "Research on the Special Protection Mechanism of Biometric Information in the Implementation of the Personal Information Protection Law". Open Journal of Legal Science 12, nr 05 (2024): 2956–63. http://dx.doi.org/10.12677/ojls.2024.125421.
Pełny tekst źródłaGomez-Barrero, Marta, Christian Rathgeb, Guoqiang Li, Raghavendra Ramachandra, Javier Galbally i Christoph Busch. "Multi-biometric template protection based on bloom filters". Information Fusion 42 (lipiec 2018): 37–50. http://dx.doi.org/10.1016/j.inffus.2017.10.003.
Pełny tekst źródłaGazina, Nayana Igorevna. "International and National Legal Approaches to the Protection of Genetic Information". Международное право, nr 4 (kwiecień 2022): 49–59. http://dx.doi.org/10.25136/2644-5514.2022.4.39236.
Pełny tekst źródłaHameed Yassir, Mohammed Ali, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin i Norulhusna Ahmad. "A standard ranking algorithm for robust iris template protection". Indonesian Journal of Electrical Engineering and Computer Science 34, nr 2 (1.05.2024): 1214. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1214-1225.
Pełny tekst źródłaHu, Jian Feng, i Zhen Dong Mu. "Authentication System for Biometric Applications Using Mobile Devices". Applied Mechanics and Materials 457-458 (październik 2013): 1224–27. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1224.
Pełny tekst źródłaFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, nr 4 (25.01.2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Pełny tekst źródłaPotocký, Sebastián, i Jozef Štulrajter. "The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity". Science & Military 17, nr 1 (2022): 29–36. http://dx.doi.org/10.52651/sam.a.2022.1.29-36.
Pełny tekst źródłaRen, Lijing, i Denghui Zhang. "A Privacy-Preserving Biometric Recognition System with Visual Cryptography". Advances in Multimedia 2022 (22.03.2022): 1–7. http://dx.doi.org/10.1155/2022/1057114.
Pełny tekst źródłaKuznetsov, A. A. "Legal Basis of Biometric Methods of Identity Authentication". Economics. Law. Innovaion, nr 1 (30.03.2021): 85–90. http://dx.doi.org/10.17586/2713-1874-2021-1-85-90.
Pełny tekst źródłaZannou, Boris Jerson, Tahirou Djara i Antoine Vianou. "Cylindrical Curve for Contactless Fingerprint Template Securisation". International Journal of Information Security and Privacy 16, nr 1 (1.01.2022): 1–28. http://dx.doi.org/10.4018/ijisp.303664.
Pełny tekst źródłaZhongyu, Yin, i Yang Zihan. "Research on Legal Protection of Biometric Information in the Era of Web3.0". Progress in Social Sciences 6, nr 2 (2024): 179–89. http://dx.doi.org/10.35534/pss.0602015.
Pełny tekst źródłaYugai, Lyudmila. "ON THE ISSUE OF ENSURING BIOMETRIC DATA SECURITY DURING THE PERIOD OF THE DIGITALIZATION OF SOCIETY". Review of Law Sciences 5, nr 3 (24.11.2021): 63–74. http://dx.doi.org/10.51788/tsul.rols.2021.5.3./avtc7994.
Pełny tekst źródłaHernández-Álvarez, Luis, José María de Fuentes, Lorena González-Manzano i Luis Hernández Encinas. "Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review". Sensors 21, nr 1 (25.12.2020): 92. http://dx.doi.org/10.3390/s21010092.
Pełny tekst źródłaHölbl, Marko, Boštjan Kežmah i Marko Kompara. "Data Protection Heterogeneity in the European Union". Applied Sciences 11, nr 22 (18.11.2021): 10912. http://dx.doi.org/10.3390/app112210912.
Pełny tekst źródłaKupiec, Mateusz. "Protection of Students’ Personal Data in Times of Development of Biometric Technologies as a Challenge for Universities in Poland". Białostockie Studia Prawnicze 25, nr 4 (1.12.2020): 85–95. http://dx.doi.org/10.15290/bsp.2020.25.04.06.
Pełny tekst źródłaGuo, Chunjie, Lin You i Gengran Hu. "A Novel Biometric Identification Scheme Based on Zero-Knowledge Succinct Noninteractive Argument of Knowledge". Security and Communication Networks 2022 (13.09.2022): 1–13. http://dx.doi.org/10.1155/2022/2791058.
Pełny tekst źródłaKrausová, Alžběta. "Online Behavior Recognition: Can We Consider It Biometric Data under GDPR?" Masaryk University Journal of Law and Technology 12, nr 2 (17.09.2018): 161–78. http://dx.doi.org/10.5817/mujlt2018-2-3.
Pełny tekst źródłaKuznetsov, A. A., i D. O. Zakharov. "Deep learning-based models’ application to generating a cryptographic key from a face image". Radiotekhnika, nr 213 (16.06.2023): 31–40. http://dx.doi.org/10.30837/rt.2023.2.213.03.
Pełny tekst źródłaGunasekaran, Elavarasi, i Vanitha Muthuraman. "Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images". Journal of Computational and Theoretical Nanoscience 17, nr 12 (1.12.2020): 5469–76. http://dx.doi.org/10.1166/jctn.2020.9441.
Pełny tekst źródła