McGraw-Hill/Osborne, 2003 - Computers - 432 pages
Discusses the diverse types of authentication--PINs, passwords, Tokens, USB Tokens, Smart Cards, Voice, Signature, Keystroke, Iris, Fingerprint, Face, or Hand--and how to select the proper method for one's individual environment, and explains how to overcome the challenges, including privacy issues, of utilizing biometrics in an overall security design. Original. (Intermediate)
What people are saying - Write a review
We haven't found any reviews in the usual places.
Authentication and Biometrics Overview
How Authentication Technologies Work
Chapter 2 How Biometrics Work
27 other sections not shown
Other editions - View all
access control AFIS agencies algorithms alphanumeric attacks authentication system automated BioAPI biometric applications biometric data biometric identifier biometric information biometric systems biometric technology camera capture casino Cathy Chapter civil files collected cost Court crime criminal master file database developed device disclosure document electronic signature employees enrollment error rates example face facial recognition systems federal finger fingerprint records fraud function creep hand geometry human IAFIS identity implementation individual iris recognition issue keystroke keystroke dynamics latent law enforcement liveness testing million national ID card NIST Office operational password patterns performance person potential prints Privacy Act protection records retina retinal scanning ridge sample scanner scanning sensor smart card speaker recognition specific standard stored surveillance techniques template terrorist thermography tion transactions U.S. government United vendors verification voice Washington D.C.