Artigos de revistas sobre o tema "Biometric information protection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Biometric information protection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Lee, Boo-Ha, e Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection". LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, n.º 1 (30 de junho de 2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Texto completo da fonteTeng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A. e Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter". HighTech and Innovation Journal 4, n.º 2 (1 de junho de 2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Texto completo da fonteTaha, Mohammed A., e Hanaa M. Ahmed. "A fuzzy vault development based on iris images". EUREKA: Physics and Engineering, n.º 5 (13 de setembro de 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Texto completo da fonteKim, Younjin, e Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology". Korean Constitutional Law Association 28, n.º 4 (30 de dezembro de 2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Texto completo da fonteShin, Yong-Nyuo, Yong-Jun Lee e Myung-Geun Chun. "Biometric Template Security for Personal Information Protection". Journal of Korean Institute of Intelligent Systems 18, n.º 4 (25 de agosto de 2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Texto completo da fonteLee, Yong-Joon, e Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de maio de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completo da fonteLee, Yong-Joon, e Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de maio de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completo da fonteSulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised". Information and Control Systems, n.º 4 (24 de agosto de 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Texto completo da fontePunithavathi, P., e S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns". Indonesian Journal of Electrical Engineering and Computer Science 7, n.º 3 (1 de setembro de 2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Texto completo da fonteMa, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience". Lecture Notes in Education Psychology and Public Media 10, n.º 1 (14 de setembro de 2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Texto completo da fonteJoyce, S., e S. Veni. "Iris Biometric Watermarking for Authentication Using Multiband Discrete Wavelet Transform and Singular-Value Decomposition". International journal of electrical and computer engineering systems 14, n.º 3 (28 de março de 2023): 259–66. http://dx.doi.org/10.32985/ijeces.14.3.3.
Texto completo da fonteArutyunov, V. V., e N. S. Natkin. "Comparative analysis of biometric systems for information protection". Scientific and Technical Information Processing 37, n.º 2 (abril de 2010): 87–93. http://dx.doi.org/10.3103/s0147688210020012.
Texto completo da fonteTot, Ivan, Jovan Bajčetić, Boriša Jovanović, Mladen Trikoš, Dušan Bogićević e Tamara Gajić. "Biometric standards and methods". Vojnotehnicki glasnik 69, n.º 4 (2021): 963–77. http://dx.doi.org/10.5937/vojtehg69-32296.
Texto completo da fonteKumaran, P., R. Ashoka Rajan, T. Veeramani e R. Thilagavathy. "Template Protection Using Multi Biometric Web Modulo Graph". Journal of Computational and Theoretical Nanoscience 16, n.º 11 (1 de novembro de 2019): 4883–88. http://dx.doi.org/10.1166/jctn.2019.8400.
Texto completo da fonteVoznyi, Yaroslav, Mariia Nazarkevych, Volodymyr Hrytsyk, Nataliia Lotoshynska e Bohdana Havrysh. "DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD". Cybersecurity: Education, Science, Technique 12, n.º 4 (24 de junho de 2021): 85–95. http://dx.doi.org/10.28925/2663-4023.2021.12.8595.
Texto completo da fonteYang, Wencheng, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone e Craig Valli. "A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things". Sensors 19, n.º 13 (6 de julho de 2019): 2985. http://dx.doi.org/10.3390/s19132985.
Texto completo da fonteAstrakhantsev, Andrii, e Galyna Liashenko. "Data protection management process during remote biometric authentication". System research and information technologies, n.º 3 (30 de outubro de 2022): 71–85. http://dx.doi.org/10.20535/srit.2308-8893.2022.3.05.
Texto completo da fonteBisogni, Carmen, Lucia Cascone e Fabio Narducci. "Periocular Data Fusion for Age and Gender Classification". Journal of Imaging 8, n.º 11 (9 de novembro de 2022): 307. http://dx.doi.org/10.3390/jimaging8110307.
Texto completo da fonteShin, Yong-Nyuo, e Myung-Geun Chun. "Personal Information Protection for Biometric Verification based TeleHealth Services". Journal of Korean Institute of Intelligent Systems 20, n.º 5 (25 de outubro de 2010): 659–64. http://dx.doi.org/10.5391/jkiis.2010.20.5.659.
Texto completo da fonteLiu, Yue. "Property rights for biometric information – a protection measure?" International Journal of Private Law 2, n.º 3 (2009): 244. http://dx.doi.org/10.1504/ijpl.2009.024141.
Texto completo da fonteUtegen, D., e B. Zh Rakhmetov. "Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models". Journal of Digital Technologies and Law 1, n.º 3 (20 de agosto de 2023): 825–44. http://dx.doi.org/10.21202/jdtl.2023.36.
Texto completo da fonteKOPCZEWSKI, Marian, e Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS". Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, n.º 4 (2 de outubro de 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.
Texto completo da fontePatil, Sonali D., Roshani Raut, Rutvij H. Jhaveri, Tariq Ahamed Ahanger, Pallavi V. Dhade, Atul B. Kathole e Kapil N. Vhatkar. "Robust Authentication System with Privacy Preservation of Biometrics". Security and Communication Networks 2022 (2 de maio de 2022): 1–14. http://dx.doi.org/10.1155/2022/7857975.
Texto completo da fonteShi, Quan. "Guardians of Privacy: Understanding the European Union's Framework for Biometric Data Protection". International Journal of Biology and Life Sciences 3, n.º 1 (30 de maio de 2023): 59–61. http://dx.doi.org/10.54097/ijbls.v3i1.9669.
Texto completo da fonteS. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund e Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users". Entropy 21, n.º 11 (24 de outubro de 2019): 1033. http://dx.doi.org/10.3390/e21111033.
Texto completo da fonteKim, Jun Hwan, Woon-Kyung Song e Hyun Cheol Lee. "Exploring the Determinants of Travelers’ Intention to Use the Airport Biometric System: A Korean Case Study". Sustainability 15, n.º 19 (24 de setembro de 2023): 14129. http://dx.doi.org/10.3390/su151914129.
Texto completo da fonteMohan, Mamtha, e B. K. Sujatha. "A Tenable Approach for Protection of Electronic Medical Records Using Thermal Image Watermarking". International Journal of Biomedical and Clinical Engineering 6, n.º 2 (julho de 2017): 46–61. http://dx.doi.org/10.4018/ijbce.2017070104.
Texto completo da fonteZhao, Dongdong, Shu Fang, Jianwen Xiang, Jing Tian e Shengwu Xiong. "Iris Template Protection Based on Local Ranking". Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4519548.
Texto completo da fonteLoboda, Dmitriy I. "Protection of biometric information in the framework of aviation security procedures". Herald of the Azerbaijan Engineering Academy 14, n.º 4 (2022): 21–28. http://dx.doi.org/10.52171/2076-0515_2022_14_04_21_28.
Texto completo da fonteNI, YIN, e LING YE. "Legal Protection Dilemma and Countermeasures of Chinese consumers" Personal Biometric Information". Dong-A Journal of International Business Transactions Law 39 (31 de outubro de 2022): 105–34. http://dx.doi.org/10.31839/ibt.2022.10.39.105.
Texto completo da fonteHayat Al-Dmour, Et al. "Enhancing Biometric Security: A Framework for Detecting and Preventing False Identification". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 9 (5 de novembro de 2023): 3681–90. http://dx.doi.org/10.17762/ijritcc.v11i9.9591.
Texto completo da fonte王, 丹. "Research on the Special Protection Mechanism of Biometric Information in the Implementation of the Personal Information Protection Law". Open Journal of Legal Science 12, n.º 05 (2024): 2956–63. http://dx.doi.org/10.12677/ojls.2024.125421.
Texto completo da fonteGomez-Barrero, Marta, Christian Rathgeb, Guoqiang Li, Raghavendra Ramachandra, Javier Galbally e Christoph Busch. "Multi-biometric template protection based on bloom filters". Information Fusion 42 (julho de 2018): 37–50. http://dx.doi.org/10.1016/j.inffus.2017.10.003.
Texto completo da fonteGazina, Nayana Igorevna. "International and National Legal Approaches to the Protection of Genetic Information". Международное право, n.º 4 (abril de 2022): 49–59. http://dx.doi.org/10.25136/2644-5514.2022.4.39236.
Texto completo da fonteHameed Yassir, Mohammed Ali, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin e Norulhusna Ahmad. "A standard ranking algorithm for robust iris template protection". Indonesian Journal of Electrical Engineering and Computer Science 34, n.º 2 (1 de maio de 2024): 1214. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1214-1225.
Texto completo da fonteHu, Jian Feng, e Zhen Dong Mu. "Authentication System for Biometric Applications Using Mobile Devices". Applied Mechanics and Materials 457-458 (outubro de 2013): 1224–27. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1224.
Texto completo da fonteFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense". Journal of Electrical Systems 19, n.º 4 (25 de janeiro de 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Texto completo da fontePotocký, Sebastián, e Jozef Štulrajter. "The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity". Science & Military 17, n.º 1 (2022): 29–36. http://dx.doi.org/10.52651/sam.a.2022.1.29-36.
Texto completo da fonteRen, Lijing, e Denghui Zhang. "A Privacy-Preserving Biometric Recognition System with Visual Cryptography". Advances in Multimedia 2022 (22 de março de 2022): 1–7. http://dx.doi.org/10.1155/2022/1057114.
Texto completo da fonteKuznetsov, A. A. "Legal Basis of Biometric Methods of Identity Authentication". Economics. Law. Innovaion, n.º 1 (30 de março de 2021): 85–90. http://dx.doi.org/10.17586/2713-1874-2021-1-85-90.
Texto completo da fonteZannou, Boris Jerson, Tahirou Djara e Antoine Vianou. "Cylindrical Curve for Contactless Fingerprint Template Securisation". International Journal of Information Security and Privacy 16, n.º 1 (1 de janeiro de 2022): 1–28. http://dx.doi.org/10.4018/ijisp.303664.
Texto completo da fonteZhongyu, Yin, e Yang Zihan. "Research on Legal Protection of Biometric Information in the Era of Web3.0". Progress in Social Sciences 6, n.º 2 (2024): 179–89. http://dx.doi.org/10.35534/pss.0602015.
Texto completo da fonteYugai, Lyudmila. "ON THE ISSUE OF ENSURING BIOMETRIC DATA SECURITY DURING THE PERIOD OF THE DIGITALIZATION OF SOCIETY". Review of Law Sciences 5, n.º 3 (24 de novembro de 2021): 63–74. http://dx.doi.org/10.51788/tsul.rols.2021.5.3./avtc7994.
Texto completo da fonteHernández-Álvarez, Luis, José María de Fuentes, Lorena González-Manzano e Luis Hernández Encinas. "Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review". Sensors 21, n.º 1 (25 de dezembro de 2020): 92. http://dx.doi.org/10.3390/s21010092.
Texto completo da fonteHölbl, Marko, Boštjan Kežmah e Marko Kompara. "Data Protection Heterogeneity in the European Union". Applied Sciences 11, n.º 22 (18 de novembro de 2021): 10912. http://dx.doi.org/10.3390/app112210912.
Texto completo da fonteKupiec, Mateusz. "Protection of Students’ Personal Data in Times of Development of Biometric Technologies as a Challenge for Universities in Poland". Białostockie Studia Prawnicze 25, n.º 4 (1 de dezembro de 2020): 85–95. http://dx.doi.org/10.15290/bsp.2020.25.04.06.
Texto completo da fonteGuo, Chunjie, Lin You e Gengran Hu. "A Novel Biometric Identification Scheme Based on Zero-Knowledge Succinct Noninteractive Argument of Knowledge". Security and Communication Networks 2022 (13 de setembro de 2022): 1–13. http://dx.doi.org/10.1155/2022/2791058.
Texto completo da fonteKrausová, Alžběta. "Online Behavior Recognition: Can We Consider It Biometric Data under GDPR?" Masaryk University Journal of Law and Technology 12, n.º 2 (17 de setembro de 2018): 161–78. http://dx.doi.org/10.5817/mujlt2018-2-3.
Texto completo da fonteKuznetsov, A. A., e D. O. Zakharov. "Deep learning-based models’ application to generating a cryptographic key from a face image". Radiotekhnika, n.º 213 (16 de junho de 2023): 31–40. http://dx.doi.org/10.30837/rt.2023.2.213.03.
Texto completo da fonteGunasekaran, Elavarasi, e Vanitha Muthuraman. "Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images". Journal of Computational and Theoretical Nanoscience 17, n.º 12 (1 de dezembro de 2020): 5469–76. http://dx.doi.org/10.1166/jctn.2020.9441.
Texto completo da fonte