Embedding biometric identifiers in 2D barcodes for improved security (English)
- New search for: Noore, A.
- New search for: Tungala, N.
- New search for: Houck, M.M.
- New search for: Noore, A.
- New search for: Tungala, N.
- New search for: Houck, M.M.
In:
Computers and Security
;
23
, 8
;
679-686
;
2004
-
ISSN:
- Article (Journal) / Print
-
Title:Embedding biometric identifiers in 2D barcodes for improved security
-
Contributors:
-
Published in:Computers and Security ; 23, 8 ; 679-686
-
Publisher:
-
Publication date:2004
-
Size:8 Seiten, 17 Quellen
-
ISSN:
-
Coden:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 23, Issue 8
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 621
-
Is the U.S. government really getting serious about information security?Dr. Schultz, Eugene et al. | 2004
- 623
-
Security views| 2004
- 633
-
From secure wired networks to secure wireless networks #8211 what are the extra risks?| 2004
- 633
-
From secure wired networks to secure wireless networks – what are the extra risks?von Solms, Basie / Marais, Emil et al. | 2004
- 638
-
A framework for the governance of information securityPosthumus, Shaun / von Solms, Rossouw et al. | 2004
- 647
-
Events Calendar| 2004
- 649
-
XML distributed security policy for clustersApvrille, A. / Pourzandi, M. et al. | 2004
- 659
-
Access control in a hierarchy using one-way hash functionsYang, Cungang / Li, Celia et al. | 2004
- 665
-
Characterization of defense mechanisms against distributed denial of service attacksChen, Li-Chiou / Longstaff, Thomas A. / Carley, Kathleen M. et al. | 2004
- 679
-
Embedding biometric identifiers in 2D barcodes for improved securityNoore, Afzel / Tungala, Nikhil / Houck, Max M. et al. | 2004
- 687
-
Modelling and solving the intrusion detection problem in computer networksBeghdad, Rachid et al. | 2004
- 697
-
New efficient user identification and key distribution scheme providing enhanced securityYang, Yanjiang / Wang, Shuhong / Bao, Feng / Wang, Jie / Deng, Robert H. et al. | 2004
- 705
-
A hybrid scheme for multicast authentication over lossy networksAslan, Heba K. et al. | 2004